CINXE.COM
eSentire | Digital Forensics - Incident Response - Incident Detection…
<!doctype html> <html lang="en-US"> <head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"> <meta name="robots" content="noodp,noydir"> <!-- Google Tag Manager --> <script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-57Z6ZWR'); </script> <!-- End Google Tag Manager --> <script> (function () { var zi = document.createElement('script'); zi.type = 'text/javascript'; zi.async = true; zi.src = 'https://ws.zoominfo.com/pixel/3k8XsFBkOniCq5dTRwpV'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(zi, s); })(); </script> <link rel="stylesheet" href="/style.css?v=4.11.57"> <link rel="stylesheet" href="https://unpkg.com/aos@2.3.1/dist/aos.css"> <link rel="stylesheet" href="https://cdn.jsdelivr.net/npm/swiper@9/swiper-bundle.min.css"/> <link rel="shortcut icon" href="https://esentire-dot-com-assets.s3.ca-central-1.amazonaws.com/assetsV4/External/blue_favicon_48x48.ico?v=2024"> <link rel="stylesheet" href="https://use.typekit.net/evh1ctd.css"> <link rel="stylesheet" href="https://use.typekit.net/amm2djb.css"> <!-- Start VWO SmartCode --> <script referrerPolicy="no-referrer-when-downgrade" src="https://dev.visualwebsiteoptimizer.com/lib/780243.js" id="vwoCode"></script> <!-- End VWO SmartCode --> <title>eSentire | Digital Forensics - Incident Response - Incident Detection…</title><meta name="generator" content="SEOmatic"> <meta name="description" content="Get back to normal operations in a matter of hours with our guaranteed 4-hour threat suppression available with eSentire Digital Forensics and Incident…"> <meta name="referrer" content="no-referrer-when-downgrade"> <meta name="robots" content="all"> <meta content="https://www.facebook.com/eSentireMDR/" property="fb:profile_id"> <meta content="en_US" property="og:locale"> <meta content="eSentire" property="og:site_name"> <meta content="website" property="og:type"> <meta content="https://www.esentire.com/what-we-do/digital-forensics-and-incident-response" property="og:url"> <meta content="Digital Forensics - Incident Response - Incident Detection - Cyber…" property="og:title"> <meta content="Get back to normal operations in a matter of hours with our guaranteed 4-hour threat suppression available with eSentire Digital Forensics and Incident…" property="og:description"> <meta content="https://s3.ca-central-1.amazonaws.com/esentire-dot-com-assets/assetsV3/External/SEO/esentire-dfir-meta.jpg" property="og:image"> <meta content="eSentire - The Authority in Managed Detection and Response" property="og:image:alt"> <meta name="twitter:card" content="summary_large_image"> <meta name="twitter:site" content="@eSentire"> <meta name="twitter:creator" content="@eSentire"> <meta name="twitter:title" content="Digital Forensics - Incident Response - Incident Detection - Cyber…"> <meta name="twitter:description" content="Get back to normal operations in a matter of hours with our guaranteed 4-hour threat suppression available with eSentire Digital Forensics and Incident…"> <meta name="twitter:image" content="https://s3.ca-central-1.amazonaws.com/esentire-dot-com-assets/assetsV3/External/SEO/esentire-dfir-meta.jpg"> <meta name="twitter:image:alt" content="eSentire - The Authority in Managed Detection and Response"> <link href="https://www.esentire.com/what-we-do/digital-forensics-and-incident-response" rel="canonical"> <link href="https://www.esentire.com" rel="home"></head> <body class="no-sidebar pageV3"> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-57Z6ZWR" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) --> <!-- Set Cookie for GCLID tracking --> <script type="text/javascript"> function readCookie(c_name) { var c_value = document.cookie; var c_start = c_value.indexOf(" " + c_name + "="); if (c_start == -1) { c_start = c_value.indexOf(c_name + "="); } if (c_start == -1) { c_value = null; } else { c_start = c_value.indexOf("=", c_start) + 1; var c_end = c_value.indexOf(";", c_start); if (c_end == -1) { c_end = c_value.length; } c_value = unescape(c_value.substring(c_start, c_end)); } return c_value; } function setCookie(a, d, b) { var c = new Date; c.setTime(c.getTime() + 864E5 * b); b = "; expires=" + c.toGMTString(); document.cookie = a + "=" + d + b } function getParam(a) { return (a = RegExp("[?&]" + a + "=([^&]*)").exec(window.location.search)) && decodeURIComponent(a[1].replace(/\+/g, " ")) } if (getParam("gclid")) { setCookie("gclid", getParam("gclid"), 270); }; if (getParam("utm_source")) { setCookie("utm_source", getParam("utm_source"), 270); }; if (getParam("utm_medium")) { setCookie("utm_medium", getParam("utm_medium"), 270); }; if (getParam("utm_campaign")) { setCookie("utm_campaign", getParam("utm_campaign"), 270); }; if (getParam("utm_content")) { setCookie("utm_content", getParam("utm_content"), 270); }; if (getParam("kpid")) { setCookie("kpid", getParam("kpid"), 270); }; if (getParam("sfcampaignid")) { setCookie("sfcampaignid", getParam("sfcampaignid"), 270) }; if (getParam("msclid")) { setCookie("msclid", getParam("msclid"), 270) }; if (getParam("li_fat_id")) { setCookie("li_fat_id", getParam("li_fat_id"), 270) }; </script> <!-- Block: NavBar --> <div class="NavBar"> <div class="NavBar__Content"> <div class="NavBar__Left"> <a class="NavBar__Logo" href="https://www.esentire.com"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 230 32" xml:space="preserve"><path d="M55.8 22c0 1.6-.3 3-1 4.2-.6 1.2-1.5 2.3-2.6 3.1-1.1.9-2.4 1.5-3.8 1.9-1.5.4-3 .6-4.6.6-2.4 0-4.5-.3-6.5-.9-1.9-.6-3.7-1.7-5.3-3.3l4.9-4.9c.8.8 1.9 1.4 3.1 1.7 1.2.3 2.5.5 3.8.5 3 0 4.4-.9 4.4-2.8 0-.8-.2-1.4-.6-1.8-.4-.4-1.1-.7-2-.8l-3.7-.5c-2.8-.4-4.8-1.3-6.2-2.8-1.4-1.5-2.1-3.6-2.1-6.3 0-1.4.2-2.7.8-4 .5-1.2 1.3-2.3 2.2-3.1 1-.9 2.2-1.6 3.5-2.1 1.4-.5 3-.7 4.7-.7 2.2 0 4.2.3 5.9.8 1.7.6 3.3 1.6 4.5 2.9l-4.8 4.8c-.4-.5-1-.8-1.6-1.1-.5-.2-1.1-.4-1.6-.5-.5-.1-1-.2-1.5-.2h-1.2c-.6 0-1.2.1-1.7.3-.4.2-.8.4-1.2.7-.3.3-.5.6-.7.9-.1.3-.2.7-.2 1 0 .2.1.5.1.7.1.3.3.5.5.7.2.2.5.4.8.6.4.2.9.3 1.3.4l3.7.5c2.7.4 4.8 1.2 6.1 2.6.8.8 1.4 1.8 1.8 2.9.6 1.4.8 2.7.8 4m7.4 9.6V.3h21v6.9H70.8v5.2h11.5v6.9H70.8v5.5h13.4v6.8h-21zm46.4 0-9.9-15.7v15.7h-7.6V.3h6.6l9.9 15.8V.3h7.6v31.3h-6.6zm28.8-24.5v24.4h-7.6V7.1h-7.6V.2H146v6.9h-7.6zm14.5 24.5V.3h7.6v31.3h-7.6zm31.9 0L179.3 20h-2.6v11.6h-7.6V.3h12.3c1.6 0 3.1.3 4.5.9 1.2.5 2.4 1.3 3.3 2.3.9.9 1.6 2 2 3.2.4 1.2.7 2.5.7 3.7 0 1-.1 2-.4 2.9-.3.8-.7 1.6-1.2 2.3-.5.7-1 1.2-1.6 1.7-.6.5-1.2.9-1.8 1.2l6.7 13.1h-8.8zm-.4-21.2c0-.8-.3-1.6-.9-2.2-.6-.6-1.4-1-2.4-1h-4.3v6.3h4.3c1 0 1.9-.3 2.4-1 .6-.5.9-1.3.9-2.1M200 31.6V.3h21v6.9h-13.4v5.2h11.5v6.9h-11.5v5.5H221v6.9l-21-.1zM22.7 3.9C19.8.2 14.9.2 14.9.2H10S5.1.2 2.2 3.9C.4 6.2 0 8.4 0 9.9V22c0 1.5.4 3.7 2.2 5.9C5 31.6 10 31.6 10 31.6h14.9v-7H11.4s-2 0-3.1-1.5c-.5-.7-.8-1.5-.9-2.4v-1.4h17.3V9.9c.1-1.5-.3-3.7-2-6M7.5 10.6c0-.9.3-1.7.9-2.4 1.2-1.5 3.1-1.5 3.1-1.5h2s2 0 3.1 1.5c.5.7.8 1.5.9 2.4v1.8h-10v-1.8zm218.3 15.7c1.5 0 2.7 1.2 2.7 2.7s-1.2 2.7-2.7 2.7c-1.5 0-2.7-1.2-2.7-2.7 0-1.5 1.2-2.7 2.7-2.7zm0 4.7c1.1 0 2.1-.9 2.1-2.1 0-1.1-.9-2.1-2.1-2.1-1.1 0-2.1.9-2.1 2.1 0 1.2.9 2.1 2.1 2.1zm-1.1-.7v-2.7h1.1c.8 0 1 .5 1 .8 0 .4-.2.7-.6.8l.7 1.1h-.6l-.7-1h-.4v1h-.5zm1-1.5c.4 0 .6-.1.6-.4 0-.3-.2-.4-.5-.4h-.5v.8h.4z" style="fill:#19234d"></path></svg> </a> </div> <div class="NavBar__Right"> <div class="NavBar__MobileGetStarted"> <a href="/get-started">Get Started</a> </div> <div class="NavBar__MainItems"> <div class="NavBar__ButtonSubtleTriggerContainer"> <div class="NavBar__ButtonSubtle NavBar__ButtonSubtleTrigger" data-nav="whatWeDo">What We Do</div> </div> <div class="NavBar__ButtonSubtleTriggerContainer"> <div class="NavBar__ButtonSubtle NavBar__ButtonSubtleTrigger" data-nav="howWeDo">How We Do It</div> </div> <div class="NavBar__ButtonSubtleTriggerContainer"> <div class="NavBar__ButtonSubtle NavBar__ButtonSubtleTrigger" data-nav="resources">Resources</div> </div> <div class="NavBar__ButtonSubtleTriggerContainer"> <div class="NavBar__ButtonSubtle NavBar__ButtonSubtleTrigger" data-nav="company">Company</div> </div> <div class="NavBar__ButtonSubtleTriggerContainer"> <div class="NavBar__ButtonSubtle NavBar__ButtonSubtleTrigger" data-nav="partners">Partners</div> </div> </div> <div class="NavBar__SecondaryItems"> <div class="NavBar__ButtonSubtleTriggerContainer NavBar__ButtonSubtleTriggerContainer--HideMobile"> <div class="NavBar__ButtonSubtle NavBar__ButtonSubtleSearchIcon NavBar__ButtonSubtleTrigger" data-nav="search"> <svg data-name="New Layer" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 32 32" style="width: 26px;"><ellipse cx="12.18" cy="12.42" rx="10.18" ry="10.42" fill="none" stroke="#000" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2.5"></ellipse><path fill="none" stroke="#000" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2.5" d="M20.45 20.23L30 30"></path></svg> </div> </div> <div class="NavBar__ButtonGetStarted"> <div id="NavBar__Button-GetStarted" class="NavBar__ButtonSubtleTrigger NavBar__Button" data-nav="getStarted"> Get Started <svg class="NavBar__Button--Close" xmlns="http://www.w3.org/2000/svg" width="17.081" height="7.498" viewBox="0 0 17.081 7.498"> <path id="Path_34" data-name="Path 34" d="M1156.073,389.624l7.959,5.685,7.959-5.685" transform="translate(-1155.492 -388.811)" fill="none" stroke="#fff" stroke-linejoin="round" stroke-width="2"/> </svg> </div> </div> <button class="NavBar__MobileNavicon" data-mobile-nav-toggle> <span class="navicon"></span> </button> </div> </div> </div> <div class="NavBar__MobileDropdown" data-mobile-nav> <div class="NavBar__MobileButtons"> <div class="NavBar__MobileButton NavBar__ButtonSubtleTrigger" data-nav="whatWeDo"> What we do <svg width="8" height="12" viewBox="0 0 8 12" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M0.220703 10.4023L4.62305 6L0.220703 1.59766L1.56836 0.25L7.31836 6L1.56836 11.75L0.220703 10.4023Z" fill="#3C2B77"/> </svg> </div> <div class="NavBar__MobileButton NavBar__ButtonSubtleTrigger" data-nav="howWeDo"> How we do it <svg width="8" height="12" viewBox="0 0 8 12" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M0.220703 10.4023L4.62305 6L0.220703 1.59766L1.56836 0.25L7.31836 6L1.56836 11.75L0.220703 10.4023Z" fill="#3C2B77"/> </svg> </div> <div class="NavBar__MobileButton NavBar__ButtonSubtleTrigger" data-nav="resources"> Resources <svg width="8" height="12" viewBox="0 0 8 12" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M0.220703 10.4023L4.62305 6L0.220703 1.59766L1.56836 0.25L7.31836 6L1.56836 11.75L0.220703 10.4023Z" fill="#3C2B77"/> </svg> </div> <div class="NavBar__MobileButton NavBar__ButtonSubtleTrigger" data-nav="company"> Company <svg width="8" height="12" viewBox="0 0 8 12" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M0.220703 10.4023L4.62305 6L0.220703 1.59766L1.56836 0.25L7.31836 6L1.56836 11.75L0.220703 10.4023Z" fill="#3C2B77"/> </svg> </div> <div class="NavBar__MobileButton NavBar__ButtonSubtleTrigger" data-nav="partners"> Partners <svg width="8" height="12" viewBox="0 0 8 12" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M0.220703 10.4023L4.62305 6L0.220703 1.59766L1.56836 0.25L7.31836 6L1.56836 11.75L0.220703 10.4023Z" fill="#3C2B77"/> </svg> </div> </div> <div class="NavBar__MobileCTA"> <a href="/get-started" class="NavBar__MobileCTAButton">Get Started</a> </div> </div> </div> <!-- WHAT WE DO --> <div class="WhatWeDo NavBar__SubMenu" data-menu="whatWeDo"> <div class="WhatWeDo__Wrapper"> <div class="MobileDropdownNav"> <button class="MobileDropdownNav__BackButton" type="button"> <svg width="6" height="9" viewBox="0 0 6 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M5.92383 7.75391L4.92773 8.75L0.677734 4.5L4.92773 0.25L5.92383 1.24609L2.66992 4.5L5.92383 7.75391Z" fill="#3C2B77"/> </svg> <span>Back</span> </button> <div class="MobileDropdownNav__Title">What We Do</div> </div> <div class="WhatWeDo__Content"> <div class="WhatWeDo__Links"> <h6>ESENTIRE SERVICES</h6> <a href="/what-we-do/esentire-managed-detection-and-response" class="WhatWeDo__LinksIconBox WhatWeDo__LinksIconBox--WithSubLinks"> <img src="https://esentire-dot-com-assets.s3.amazonaws.com/assetsV4/Common/mdr_nav_1.png" alt="MDR Icon"> <div> <h5>Managed Detection and Response</h5> <p>Combine cutting-edge XDR technology, multi-signal threat intelligence and 24/7 Elite Threat Hunters to help you build a world-class security operation.</p> </div> </a> <div class="WhatWeDo__LinksIconBoxInner"> <a href="/what-we-do/esentire-managed-detection-and-response"> <h5>All-In-One MDR Solution →</h5> </a> <a href="/what-we-do/esentire-managed-detection-and-response/microsoft-mdr"> <h5>MDR for Microsoft →</h5> </a> <a href="/what-we-do/esentire-managed-detection-and-response/mdr-for-genai"> <h5>MDR for GenAI →</h5> </a> </div> <a href="/what-we-do/digital-forensics-and-incident-response" class="WhatWeDo__LinksIconBox"> <img src="https://esentire-dot-com-assets.s3.amazonaws.com/assetsV4/Common/dfir_nav_1.png" alt="DFIR Icon"> <div> <h5>Digital Forensics and Incident Response</h5> <p>Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.</p> </div> </a> <a href="/what-we-do/exposure-vulnerability-and-risk-management" class="WhatWeDo__LinksIconBox"> <img src="https://esentire-dot-com-assets.s3.amazonaws.com/assetsV4/Common/exposure_nav_1.png" alt="Exposure Vulnerability and Risk Management Icon"> <div> <h5>Exposure Management Services</h5> <p>Cyber risk and advisory programs that identify security gaps and build security strategies to address them.</p> </div> </a> </div> <div class="WhatWeDo__Links"> <h6>PLATFORM, PEOPLE AND RESPONSE</h6> <div class="WhatWeDo__LinksBox"> <div class="WhatWeDo__LinksBoxLeft"> <a href="/what-we-do/security-operations-center"> <h5>Security Operations Center (SOC)</h5> <p>24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.</p> </a> <a href="/what-we-do/xdr-extended-detection-and-response"> <h5>Extended Detection and<br> Response (XDR)</h5> <p>XDR with machine learning that eliminates noise, enables real-time detection and response, and automatically blocks threats.</p> </a> <a href="/what-we-do/mdr-integrations"> <h5>Technology Integrations</h5> <p>Seamless integration and threat investigation across your existing tech stack.</p> </a> </div> <div class="WhatWeDo__LinksBoxRight"> <a href="/what-we-do/threat-response-unit"> <h5>Threat Response Unit (TRU)</h5> <p>Proactive threat intelligence, original threat research and a world-class team of seasoned industry veterans.</p> </a> <a href="/what-we-do/cyber-resilience-team"> <h5>Cyber Resilience Team</h5> <p>Extend your team capabilities and prevent business disruption with expertise from eSentire.</p> </a> <a href="/what-we-do/esentire-managed-detection-and-response/response-and-remediation"> <h5>Response and Remediation</h5> <p>We balance automated blocks with rapid human-led investigations to manage threats.</p> </a> </div> </div> </div> </div> </div> </div> <!-- HOW WE DO IT --> <div class="HowWeDo NavBar__SubMenu" data-menu="howWeDo"> <div class="HowWeDo__Wrapper"> <div class="MobileDropdownNav"> <button class="MobileDropdownNav__BackButton" type="button"> <svg width="6" height="9" viewBox="0 0 6 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M5.92383 7.75391L4.92773 8.75L0.677734 4.5L4.92773 0.25L5.92383 1.24609L2.66992 4.5L5.92383 7.75391Z" fill="#3C2B77"/> </svg> <span>Back</span> </button> <div class="MobileDropdownNav__Title">How We Do</div> </div> <div class="HowWeDo__Content"> <div class="HowWeDo__Links HowWeDo__Links-Icons"> <h6>24/7 MDR SIGNALS</h6> <a href="/how-we-do-it/signals/mdr-for-endpoint"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 58 58"><defs><style>.cls-endpointherosv1{fill:#fff}</style></defs><g id="Layer_2"><g id="Layer_2-2"><g id="Component_2459_7"><path id="Path_5133" d="M29 0c16 0 29 13 29 29S45 58 29 58 0 45 0 29 13 0 29 0Z" style="fill:#7f4ee5"/><g id="Group_1494"><g id="Group_1493"><path id="Path_5109" d="M45 38.6c-.4 0-.8-.4-.8-.8V16.7c0-.2-.2-.4-.4-.4H14.3c-.2 0-.4.2-.4.4v21.1c0 .4-.3.8-.7.9s-.8-.3-.9-.7V16.7c0-1.1.9-2 2-2h29.5c1.1 0 2 .9 2 2v21.1c0 .4-.4.8-.8.8" class="cls-endpointherosv1"/><path id="Path_5110" d="M24.1 38.6H10.6c-.4 0-.8-.4-.7-.9 0-.4.3-.7.7-.7h13.5c.4 0 .8.3.9.7s-.3.8-.7.9h-.2" class="cls-endpointherosv1"/><path id="Path_5111" d="M47.4 38.6H33.9c-.4 0-.8-.4-.7-.9 0-.4.3-.7.7-.7h13.5c.4 0 .8.3.9.7s-.3.8-.7.9h-.2" class="cls-endpointherosv1"/><path id="Path_5112" d="M46.1 43.4H11.9c-1.1 0-2-.9-2-2v-3.6c0-.4.3-.8.7-.9s.8.3.9.7v3.8c0 .2.2.4.4.4h34.3c.2 0 .4-.2.4-.4v-3.6c0-.4.4-.8.9-.7.4 0 .7.3.7.7v3.6c0 1.1-.9 2-2 2" class="cls-endpointherosv1"/><path id="Path_5113" d="M33.8 40.2h-9.6c-.4 0-.8-.4-.8-.8v-1.6c0-.4.3-.8.7-.9s.8.3.9.7v1h8v-.8c0-.4.4-.8.9-.7.4 0 .7.3.7.7v1.6c0 .4-.4.8-.8.8" class="cls-endpointherosv1"/><path id="Path_5114" d="M18.6 24.2c-.4 0-.8-.4-.8-.8v-3.2c0-.4.3-.8.7-.9.4 0 .8.3.9.7v3.3c0 .4-.4.8-.8.8" class="cls-endpointherosv1"/></g></g></g></g></g></svg><div> <h5>Endpoint</h5> <p>Guard endpoints by isolating and remediating threats to prevent lateral spread.</p> </div> </a> <a href="/how-we-do-it/signals/mdr-for-network"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 58 58"><defs><path d="M15.6 13.7h26.9v30.7H15.6z" style="fill:none"/><style>.cls-Networkherosv2{fill:#fff}</style></defs><g id="Layer_2"><g id="Layer_2-2"><g id="Component_2459_8"><path id="Path_5133-2" d="M29 0c16 0 29 13 29 29S45 58 29 58 0 45 0 29 13 0 29 0Z" style="fill:#6c67d5"/><g id="Group_1502"><g id="Group_1501"><path id="Path_5139" d="M40.8 44.3H17.3c-.9 0-1.7-.8-1.7-1.7V15.3c0-.9.8-1.7 1.7-1.7h23.5c.9 0 1.7.8 1.7 1.7v27.3c0 .9-.8 1.7-1.7 1.7M17.2 15.1c-.2 0-.3.1-.3.3v27.3c0 .2.1.3.3.3h23.5c.2 0 .3-.1.3-.3V15.3c0-.2-.1-.3-.3-.3H17.2Z" class="cls-Networkherosv2"/><path id="Path_5140" d="M41.7 24.6H16.2c-.4 0-.7-.3-.7-.7 0-.4.3-.7.7-.7h25.5c.4 0 .7.3.7.7 0 .4-.3.7-.7.7" class="cls-Networkherosv2"/><path id="Path_5141" d="M20.1 21.4c-.4 0-.7-.3-.7-.7v-2.5c0-.4.3-.7.7-.7s.7.3.7.7v2.5c0 .4-.3.7-.7.7" class="cls-Networkherosv2"/><path id="Path_5142" d="M20.1 31c-.4 0-.7-.3-.7-.7v-2.5c0-.4.3-.7.7-.7s.7.3.7.7v2.5c0 .4-.3.7-.7.7" class="cls-Networkherosv2"/><path id="Path_5143" d="M20.1 40.5c-.4 0-.7-.3-.7-.7v-2.5c0-.4.3-.7.7-.7s.7.3.7.7v2.5c0 .4-.3.7-.7.7" class="cls-Networkherosv2"/><path id="Path_5144" d="M41.7 34.8H16.2c-.4 0-.7-.3-.7-.7 0-.4.3-.7.7-.7h25.5c.4 0 .7.3.7.7s-.3.7-.7.7" class="cls-Networkherosv2"/></g></g></g></g></g></svg> <div> <h5>Network</h5> <p>Defend brute force attacks, active intrusions and unauthorized scans.</p> </div> </a> <a href="/how-we-do-it/signals/mdr-for-log"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 32 32"><path d="M16 0c8.84 0 16 7.16 16 16s-7.16 16-16 16S0 24.84 0 16 7.16 0 16 0Z" style="stroke-width:0;fill:#687dd5"/><path d="M22.16 12.23a.278.278 0 0 0-.07-.23l-4.17-4.17a.235.235 0 0 0-.25-.06c-.03 0-.05-.01-.08-.01H12.4a.476.476 0 0 0-.48.47v13.46a.476.476 0 0 0 .48.48h9.29a.476.476 0 0 0 .48-.48V12.24m-4.18-3.6 3.29 3.29H18V8.64Zm3.66 13.01h-9.21V8.27h5.04v3.91c0 .14.12.26.26.26h3.91v9.22Zm-2.06 2.6h-9.28a.476.476 0 0 1-.48-.48V10.31c0-.26.21-.48.47-.48h.47c.14 0 .26.11.26.26s-.11.26-.26.26h-.43v13.38h9.2v-.44c0-.14.11-.26.26-.26s.26.11.26.26v.48a.476.476 0 0 1-.48.48m.24-4.52c-.14 0-.26-.12-.26-.26v-1.39c0-.14.11-.26.26-.26s.26.11.26.26v1.39c0 .14-.12.26-.26.26" style="fill:#fff;stroke-width:0"/></svg> <div> <h5>Log</h5> <p>Investigation and threat detection across multi-cloud or hybrid environments.</p> </div> </a> <a href="/how-we-do-it/signals/cloud"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 32 32"><path d="M16 0c8.84 0 16 7.16 16 16s-7.16 16-16 16S0 24.84 0 16 7.16 0 16 0Z" style="stroke-width:0;fill:#40C3D9"/><path d="M20.52 21.64h-9.68c-2.06 0-3.72-1.69-3.72-3.75 0-1.52.93-2.88 2.34-3.45-.02-.2-.04-.39-.04-.59a5.416 5.416 0 0 1 5.34-5.49 5.423 5.423 0 0 1 5.14 3.5h.12c2.69 0 4.86 2.2 4.85 4.89 0 2.42-1.5 4.88-4.35 4.89ZM14.84 8.87c-2.71 0-4.91 2.2-4.91 4.91v.06c0 .24.02.48.06.72.02.12-.05.24-.17.28-1.69.57-2.59 2.4-2.03 4.09a3.204 3.204 0 0 0 3.04 2.19h9.66c2.54 0 3.87-2.21 3.87-4.38 0-2.41-1.94-4.37-4.35-4.38-.09 0-.17 0-.26.02a.262.262 0 0 1-.27-.17c-.67-2-2.55-3.34-4.66-3.34m6.64 8.91v-1.53c0-.14-.11-.25-.25-.25s-.25.11-.25.25v1.53c0 .14.11.25.25.25s.25-.11.25-.25" style="fill:#fff;stroke-width:0"/></svg> <div> <h5>Cloud</h5> <p>Remediate misconfigurations, vulnerabilities and policy violations.</p> </div> </a> <a href="/how-we-do-it/signals/identity"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" data-name="Layer 2" version="1.1" viewBox="0 0 58 58"><defs><clipPath id="clippath"><path d="M12.9 14.8h32.3v28.5H12.9z" style="stroke-width:0;fill:none"/></clipPath><style>.clsInsider-threat-4{stroke-width:0;fill:#fff}</style></defs><g id="Layer_2-2" data-name="Layer 2-2"><g id="Component_2459_11" data-name="Component 2459 11"><path id="Path_5133-5" d="M29 0c16 0 29 13 29 29S45 58 29 58 0 45 0 29 13 0 29 0Z" data-name="Path 5133-5" style="fill:#2cb1e2;stroke-width:0"/><g id="Group_1790" data-name="Group 1790" style="clip-path:url(#clippath)"><g id="Group_1789" data-name="Group 1789"><path id="Path_5151" d="M43.4 43.2H14.6c-1 0-1.8-.8-1.8-1.8V20.7c0-1 .8-1.8 1.8-1.8h28.7c1 0 1.8.8 1.8 1.8v20.7c0 1-.8 1.8-1.8 1.8M14.6 20.5c-.2 0-.3.1-.3.3v20.7c0 .2.1.3.3.3h28.7c.2 0 .3-.1.3-.3V20.8c0-.2-.1-.3-.3-.3H14.6Z" class="clsInsider-threat-4" data-name="Path 5151"/><path id="Path_5152" d="M44.4 29.2H13.6c-.4 0-.7-.3-.7-.7s.3-.7.7-.7h30.8c.4 0 .7.3.7.7s-.3.7-.7.7" class="clsInsider-threat-4" data-name="Path 5152"/><path id="Path_5153" d="M34.4 20.5c-.4 0-.7-.3-.7-.7v-2.1c0-.8-.6-1.4-1.4-1.4h-6.4c-.8 0-1.4.6-1.4 1.4v2.1c0 .4-.3.7-.7.7s-.7-.3-.7-.7v-2.1c0-1.6 1.3-2.9 2.9-2.9h6.4c1.6 0 2.9 1.3 2.9 2.9v2.1c0 .4-.3.7-.7.7" class="clsInsider-threat-4" data-name="Path 5153"/><path id="Path_5154" d="M29 26.4c-.4 0-.7-.3-.7-.7V23c0-.4.3-.7.7-.7s.7.3.7.7v2.7c0 .4-.3.7-.7.7" class="clsInsider-threat-4" data-name="Path 5154"/></g></g></g></g></svg> <div> <h5>Identity</h5> <p>Investigate and respond to compromised identities and insider threats.</p> </div> </a> </div> <div class="HowWeDo__RightLinks"> <div class="HowWeDo__Links"> <h6>INDUSTRIES</h6> <a href="/how-we-do-it/industries/insurance-cybersecurity"> <h5>Insurance</h5> </a> <a href="/how-we-do-it/industries/construction-cybersecurity"> <h5>Construction</h5> </a> <a href="/how-we-do-it/industries/financial-services-cybersecurity"> <h5>Finance</h5> </a> <a href="/how-we-do-it/industries/legal-cybersecurity"> <h5>Legal</h5> </a> <a href="/how-we-do-it/industries/manufacturing-cybersecurity"> <h5>Manufacturing</h5> </a> <a href="/how-we-do-it/industries/private-equity-cybersecurity"> <h5>Private Equity</h5> </a> <a href="/how-we-do-it/industries/healthcare-cybersecurity"> <h5>Healthcare</h5> </a> <a href="/how-we-do-it/industries/retail-cybersecurity"> <h5>Retail</h5> </a> <a href="/how-we-do-it/industries/food-supply-cybersecurity"> <h5>Food Supply</h5> </a> <a href="/how-we-do-it/industries/state-local-governments-cybersecurity"> <h5>Government and Education</h5> </a> <a href="/how-we-do-it/industries/automotive-dealerships"> <h5>Automotive Dealerships</h5> </a> </div> <div class="HowWeDo__Links"> <h6>USE CASES</h6> <div class="HowWeDo__Links-2"> <a href="/how-we-do-it/use-cases/ransomware"> <h5>Ransomware</h5> <p>Stop ransomware before it spreads.</p> </a> <a href="/how-we-do-it/use-cases/cybersecurity-compliance"> <h5>Cybersecurity Compliance</h5> <p>Meet regulatory compliance mandates.</p> </a> <a href="/how-we-do-it/use-cases/zero-day-exploits"> <h5>Zero Day Attacks</h5> <p>Detect and respond to zero-day exploits.</p> </a> <a href="/how-we-do-it/use-cases/cloud-misconfiguration-breaches"> <h5>Cloud Misconfiguration</h5> <p>End misconfigurations and policy violations.</p> </a> <a href="/how-we-do-it/use-cases/third-party-cyber-risk"> <h5>Third-Party Risk</h5> <p>Defend third-party and supply chain risk.</p> </a> <a href="/how-we-do-it/use-cases/mdr-outsourcing"> <h5>Do More With Less</h5> <p>Prevent disruption by outsourcing MDR.</p> </a> <a href="/how-we-do-it/use-cases/cyber-risk-management"> <h5>Cyber Risk</h5> <p>Adopt a risk-based security approach.</p> </a> <a href="/how-we-do-it/use-cases/meet-cyber-insurance-requirements"> <h5>Cyber Insurance</h5> <p>Meet insurability requirements with MDR.</p> </a> <a href="/how-we-do-it/use-cases/sensitive-data"> <h5>Sensitive Data Security</h5> <p>Protect your most sensitive data.</p> </a> <a href="/how-we-do-it/use-cases/security-leadership"> <h5>Security Leadership</h5> <p>Build a proven security program.</p> </a> <a href="/how-we-do-it/use-cases/cyber-threat-intelligence"> <h5>Cyber Threat Intelligence</h5> <p>Operationalize timely, accurate, and actionable cyber threat intelligence.</p> </a> </div> </div> </div> </div> <div class="HowWeDo__Box"> <div class="HowWeDo__BoxInner"> <div class="HowWeDo__BoxLeft"> <div class="HowWeDo__Links"> <a href="/how-we-do-it/mdr-pricing-packaging"> <h5>MDR Pricing</h5> <p>Three MDR package tiers are available based on per-user pricing and level of risk tolerance to enhance your existing defenses and resources.</p> </a> </div> </div> <div class="HowWeDo__BoxRight"> <a href="/how-we-do-it/mdr-pricing-packaging">EXPLORE MDR PACKAGES <span>→</span></a> </div> </div> </div> </div> </div> <!-- Resources --> <div class="Resources NavBar__SubMenu" data-menu="resources"> <div class="Resources__Wrapper"> <div class="MobileDropdownNav"> <button class="MobileDropdownNav__BackButton" type="button"> <svg width="6" height="9" viewBox="0 0 6 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M5.92383 7.75391L4.92773 8.75L0.677734 4.5L4.92773 0.25L5.92383 1.24609L2.66992 4.5L5.92383 7.75391Z" fill="#3C2B77"/> </svg> <span>Back</span> </button> <div class="MobileDropdownNav__Title">Resources</div> </div> <div class="Resources__Content"> <div class="Resources__BlogResources"> <div class="Resources__Links Resources__Links-Blogs"> <div> <h6>From The Blog</h6> <a href="https://www.esentire.com/blog/bored-beavertail-invisibleferret-yacht-club-a-lazarus-lure-pt-2"> <span class="Resources__Eyebrow">Nov 14, 2024</span> <h5>Bored BeaverTail & InvisibleFerret Yacht Club – A Lazarus Lure Pt.2 </h5> </a> <a href="https://www.esentire.com/blog/bored-beavertail-yacht-club-a-lazarus-lure"> <span class="Resources__Eyebrow">Oct 17, 2024</span> <h5>Bored BeaverTail Yacht Club – A Lazarus Lure </h5> </a> <a href="https://www.esentire.com/blog/cybersecurity-spending-where-to-allocate-your-budget-in-2025"> <span class="Resources__Eyebrow">Oct 17, 2024</span> <h5>Cybersecurity Spending: Where to Allocate Your Budget in 2025 </h5> </a> </div> <div class="Resources__BoxCTA"> <a href="/resources/blog"> VIEW ARTICLES <span>→</span> </a> </div> </div> <div class="Resources__Links"> <div class="Resources__Links Resources__Links-Library"> <h6>Resources</h6> <a href="/resources/mdr-and-cybersecurity-case-studies"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 32 32"><defs><style>.clsCaseStudiesIcon-2{stroke-width:0;fill:#fff}</style></defs><g id="Group_1940"><circle id="Ellipse_16" cx="16" cy="16" r="16" style="stroke-width:0;fill:#19234d"/><g id="Group_1906"><path id="Path_5883" d="M20.3 22.37c-1.12 0-2.03-.91-2.03-2.03 0-1.12.91-2.03 2.03-2.03s2.03.91 2.03 2.03c0 1.12-.91 2.03-2.03 2.03m0-3.47c-.8 0-1.44.64-1.44 1.44s.64 1.44 1.44 1.44 1.44-.64 1.44-1.44c0-.79-.65-1.44-1.44-1.44" class="clsCaseStudiesIcon-2"/><path id="Path_5884" d="M22.62 22.95c-.08 0-.15-.03-.21-.09l-1.09-1.09c-.1-.14-.06-.32.07-.42.1-.07.24-.07.35 0l1.09 1.09a.3.3 0 0 1-.02.42c-.05.05-.12.07-.19.08" class="clsCaseStudiesIcon-2"/><path id="Path_5885" d="M17.41 22.95h-5.48c-.33 0-.6-.27-.6-.6V9.65c0-.33.27-.6.6-.6h5.78c.16-.03.32.08.35.24s-.08.32-.24.35H11.95v12.71h5.48c.16-.03.32.08.35.24s-.08.32-.24.35h-.1" class="clsCaseStudiesIcon-2"/><path id="Path_5886" d="M21.46 17.45c-.17 0-.3-.13-.3-.3V13.1c-.03-.16.08-.32.24-.35.16-.03.32.08.35.24V17.14c0 .17-.13.3-.3.3" class="clsCaseStudiesIcon-2"/><path id="Path_5887" d="M21.46 13.4H17.7c-.17 0-.3-.13-.3-.3V9.34c0-.17.15-.29.31-.29.07 0 .13.03.19.08l3.76 3.76a.3.3 0 0 1-.02.42c-.05.05-.12.07-.19.08m-3.46-.59h2.75l-2.75-2.75v2.75Z" class="clsCaseStudiesIcon-2"/></g></g></svg> <h5>Case Studies</h5> </a> <a href="/resources/tru-intelligence-center"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 32 32"><defs><clipPath id="a"><path d="M8 7h15.75v18.17H8z" style="stroke-width:0;fill:none"/></clipPath></defs><circle cx="16" cy="16" r="16" style="fill:#19234d;stroke-width:0"/><g style="clip-path:url(#a)"><path d="M15.5 21.37h1.25v.4H15.5v-.4Zm4.78-.02v.44h1.27v1.69h.44v-1.69h.37v.88h.44v-.88h.37v1.31h.44v-1.31h.14v-.44h-3.47Zm-8.27 0h-1.47a.844.844 0 0 0-1.49-.79c-.03.05-.05.11-.07.17-.46-.08-.9.23-.98.69a.849.849 0 0 0 .98.98c.12.45.58.72 1.03.59s.72-.58.59-1.03a.865.865 0 0 0-.07-.17H12v-.44Zm5.46 1.95a5.85 5.85 0 0 1-.82 1.59c-.12.17-.31.27-.52.28-.21 0-.41-.11-.53-.28a5.85 5.85 0 0 1-.82-1.59c.09 0 .17-.03.26-.06.38-.16.63-.54.61-.96h.95c-.01.42.23.8.61.96.08.03.17.05.26.06m-1.2-4.36-.33 1.8h-.3a.908.908 0 0 0-.54-.93c-.38-.12-.79-.14-1.18-.06 0 0-.36-.9-.94-2.77-.35-1.1-.54-2.25-.56-3.41.39.46.97.71 1.57.67.69.02 1.38-.15 1.97-.51l-.9 2.36.95-.15-.55 3.15.81-.15Zm3-1.96c-.58 1.87-.94 2.77-.94 2.77-.39-.08-.8-.06-1.18.06-.33.14-.55.47-.54.84v.09h-.37l.93-2.66-.95.15.97-3.15-1.19.13.3-1.46c.59.35 1.27.52 1.95.5.6.05 1.19-.2 1.57-.67-.02 1.16-.21 2.31-.56 3.41m-.28 2.98c1.12-2.28 1.7-4.78 1.71-7.31 0 0 2.81 3.66-1.71 7.31m-5.71 0c-4.52-3.66-1.72-7.32-1.72-7.32 0 2.54.59 5.04 1.71 7.31m5.72-12.02-.07.03c-.99.3-1.92.8-2.72 1.47l-.02.03-.02-.03a8.165 8.165 0 0 0-2.82-1.5l-.08-.03s.1-.09.25-.19c.79-.48 1.7-.73 2.63-.73 1 0 1.97.32 2.79.9l.07.05ZM13.03 20.8v1.48c.01.19-.13.36-.32.38a.363.363 0 0 1-.38-.32v-1.53c-.01-.19.13-.36.32-.38.19-.01.36.13.38.32v.05m1.08 0v1.48c.01.19-.13.36-.32.38a.363.363 0 0 1-.38-.32v-1.53c-.01-.19.13-.36.32-.38.19-.01.36.13.38.32v.05m1.07 0v1.48c.01.19-.13.36-.32.38a.363.363 0 0 1-.38-.32v-1.53c-.01-.19.13-.36.32-.38.19-.01.36.13.38.32v.05m2.6 0v1.48c.01.19-.13.36-.32.38a.363.363 0 0 1-.38-.32v-1.53c-.01-.19.13-.36.32-.38.19-.01.36.13.38.32v.05m1.08 0v1.48c.01.19-.13.36-.32.38a.363.363 0 0 1-.38-.32v-1.53c-.01-.19.13-.36.32-.38.19-.01.36.13.38.32v.05m1.07 0v1.48c.01.19-.13.36-.32.38a.363.363 0 0 1-.38-.32v-1.53c-.01-.19.13-.36.32-.38.19-.01.36.13.38.32v.05m.5-10c-.11-.73-.31-1.45-.59-2.14l-.02-.03c.14-.22.27-.46.38-.7l-.06-.04c-.48.41-1.01.75-1.58 1.02-.88.3-1.69.77-2.38 1.39-.04.03-.09.03-.13 0-.68-.6-1.46-1.06-2.32-1.35-.59-.28-1.14-.63-1.64-1.06l-.05.04c.1.23.22.45.36.66l-.02.03c-.24.64-.42 1.3-.53 1.98s0 .03 0 .04a2.238 2.238 0 0 0 2.17 2.75c.47.02.93-.13 1.28-.44-.15-.32-.26-.66-.33-1.01-.21.21-.51.32-.81.3-.74 0-1.34-.6-1.34-1.34.01-.47.1-.94.25-1.39.23.27.47.53.74.77a.59.59 0 0 0 .06.84.59.59 0 0 0 .92-.18c.24.13.47.26.68.39.03.64.24 1.27.62 1.79l.02.03.02-.03c.38-.52.59-1.15.62-1.79.21-.14.45-.27.7-.4.14.3.5.42.79.28s.42-.5.28-.79c-.03-.05-.06-.1-.1-.15.26-.23.5-.49.72-.76.15.45.23.92.25 1.39 0 .74-.6 1.34-1.34 1.34-.3.02-.6-.09-.81-.3-.07.35-.18.68-.33 1.01.36.3.82.46 1.28.44a2.232 2.232 0 0 0 2.2-2.59" style="fill:#fff;stroke-width:0"/></g></svg> <h5>TRU Intelligence Center</h5> </a> <a href="/cybersecurity-tools"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 32 32"><defs><style>.clsDisplayCybersecurityIcon-2{stroke-width:0;fill:#fff}</style></defs><g id="Group_1934"><circle id="Ellipse_47" cx="16" cy="16" r="16" style="stroke-width:0;fill:#19234d"/><g id="Group_1911"><path id="Path_6011" d="M12.47 13.21h-1.43a.26.26 0 0 1-.17-.07l-1.8-1.8a.23.23 0 0 1 0-.34l1.47-1.43c.09-.09.25-.09.34 0l1.76 1.77s.07.11.07.17v1.47c0 .13-.11.24-.24.24m-1.33-.49h1.09V11.6l-1.52-1.52-1.12 1.09 1.56 1.56Z" class="clsDisplayCybersecurityIcon-2"/><g id="Group_1910"><path id="Path_6012" d="M15.11 15.86a.26.26 0 0 1-.17-.07l-2.64-2.64c-.09-.1-.09-.25.01-.34.09-.09.24-.09.33 0l2.64 2.64c.09.09.09.25 0 .34-.05.05-.11.07-.17.07" class="clsDisplayCybersecurityIcon-2"/><path id="Path_6013" d="M12.21 23.51c-.36 0-.72-.06-1.07-.17a.24.24 0 0 1-.1-.4l1.28-1.28-.74-.74s-.02-.02-.03-.04l-.7-.7-1.29 1.28c-.1.09-.25.09-.34 0a.207.207 0 0 1-.06-.1c-.36-1.02-.12-2.15.62-2.94a2.18 2.18 0 0 1 2.64-.46l5.04-5.03c-.47-.88-.28-1.96.46-2.63.79-.75 1.93-1 2.97-.65a.24.24 0 0 1 .1.4l-1.28 1.28.74.74.03.03.71.71 1.29-1.28c.1-.09.25-.09.34 0 .03.03.05.06.06.1.33 1.06.06 2.22-.7 3.03-.69.68-1.75.83-2.6.37l-5.04 5.03c.48.89.31 2-.42 2.71-.51.49-1.19.76-1.9.74m-.53-.53c.74.17 1.51-.04 2.07-.55.62-.61.73-1.57.26-2.3a.26.26 0 0 1 .04-.29l5.28-5.28c.08-.07.19-.09.28-.04.69.44 1.59.35 2.19-.21.54-.57.79-1.35.67-2.13l-1.15 1.15c-.09.09-.25.09-.34 0l-.91-.91-.03-.03-.88-.88c-.09-.09-.1-.25 0-.34l1.15-1.15c-.75-.13-1.52.1-2.07.63-.63.56-.76 1.5-.3 2.22.05.09.03.21-.04.29l-5.28 5.28a.23.23 0 0 1-.28.04 1.74 1.74 0 0 0-2.23.3c-.52.54-.74 1.31-.6 2.04l1.16-1.15c.09-.09.25-.09.34 0l.91.91s.02.02.03.04l.88.88c.09.09.1.25 0 .34l-1.15 1.15Z" class="clsDisplayCybersecurityIcon-2"/><path id="Path_6014" d="M20.99 23.49a.26.26 0 0 1-.17-.07l-4.11-4.11s-.03-.04-.05-.06l-.59-1.17a.23.23 0 0 1 .05-.28l1.17-1.17c.07-.07.19-.09.28-.04l1.17.59s.04.03.06.04l4.11 4.11c.09.09.09.25 0 .34l-1.76 1.76s-.11.07-.17.07m-3.9-4.5 3.91 3.91 1.42-1.42-3.91-3.91-.98-.49-.93.93.49.98Z" class="clsDisplayCybersecurityIcon-2"/></g></g></g></svg> <h5>Cybersecurity Tools</h5> </a> <a href="/resources/video-library"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 32 32"><defs><style>.clsVicoIcon-2{stroke-width:0;fill:#fff}</style></defs><g id="Group_1935"><circle id="Ellipse_43" cx="16" cy="16" r="16" style="stroke-width:0;fill:#19234d"/><g id="Group_1912"><path id="Path_6009" d="M16.15 22.9C12.2 22.9 9 19.7 9 15.75s3.2-7.15 7.15-7.15 7.15 3.2 7.15 7.15-3.2 7.15-7.15 7.15m0-13.83c-3.68 0-6.67 2.99-6.67 6.67s2.99 6.67 6.67 6.67 6.67-2.99 6.67-6.67c0-3.68-2.99-6.67-6.67-6.67" class="clsVicoIcon-2"/><path id="Path_6010" d="M14.35 18.99c-.13 0-.24-.11-.24-.24v-6.01a.243.243 0 0 1 .36-.21l5.11 3.01c.11.07.15.22.08.33-.02.04-.05.06-.08.08l-5.11 3s-.08.03-.12.03m.24-5.82v5.17l4.39-2.58-4.39-2.58Z" class="clsVicoIcon-2"/></g></g></svg> <h5>Videos</h5> </a> <a href="/resources/library?resourceType%5B%5D=Report"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 32 32"><defs><style>.clsReportIcon-2{stroke-width:0;fill:#fff}</style></defs><g id="Group_1936"><circle id="Ellipse_44" cx="16" cy="16" r="16" style="stroke-width:0;fill:#19234d"/><g id="Group_1895"><path id="Path_5961" d="M21.42 22.95h-9.24c-.33 0-.6-.27-.6-.6V9.65c0-.33.27-.6.6-.6h5.77c.16-.03.32.08.35.24.03.16-.08.32-.24.35H12.19v12.71h9.24v-9.26c-.03-.16.08-.32.24-.35s.32.08.35.24v9.35c0 .33-.27.59-.59.59" class="clsReportIcon-2"/><path id="Path_5962" d="M21.71 13.4h-3.76c-.17 0-.3-.13-.3-.3V9.34c0-.17.15-.29.31-.29.07 0 .13.03.19.08l3.76 3.76a.3.3 0 0 1-.02.42c-.05.05-.12.07-.19.08m-3.46-.59h2.75l-2.75-2.75v2.75Z" class="clsReportIcon-2"/><path id="Path_5963" d="M16.79 21.21c-1.92 0-3.48-1.56-3.48-3.48s1.56-3.48 3.48-3.48 3.48 1.56 3.48 3.48-1.56 3.48-3.48 3.48m0-6.36c-1.59 0-2.89 1.29-2.89 2.89s1.29 2.89 2.89 2.89 2.89-1.29 2.89-2.89c0-1.59-1.29-2.89-2.89-2.89" class="clsReportIcon-2"/><path id="Path_5964" d="M19.98 18.03H16.8c-.17 0-.3-.13-.3-.3v-3.18c.03-.16.18-.27.35-.24.12.02.22.12.24.24v2.89h2.89c.16-.03.32.08.35.24.03.16-.08.32-.24.35h-.1" class="clsReportIcon-2"/><path id="Path_5965" d="M14.67 20.15c-.17 0-.29-.15-.29-.31 0-.07.03-.13.08-.19l2.12-2.12c.1-.14.28-.17.42-.07.14.1.17.28.07.42-.02.03-.04.05-.07.07l-2.12 2.12c-.06.05-.13.09-.21.09" class="clsReportIcon-2"/></g></g></svg> <h5>Reports</h5> </a> <a href="/resources/library?resourceType%5B%5D=Webinar"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 32 32"><defs><style>.clsWebinarIcon-2{stroke-width:0;fill:#fff}</style></defs><g id="Group_1937"><path id="Path_6008" d="M16 0c8.84 0 16 7.16 16 16s-7.16 16-16 16S0 24.84 0 16 7.16 0 16 0Z" style="stroke-width:0;fill:#19234d"/><g id="Group_1896"><path id="Path_5966" d="M15.95 11.33c-.17 0-.3-.13-.3-.3V9.29c.03-.16.18-.27.35-.24.12.02.22.12.24.24v1.74c0 .17-.13.3-.3.3" class="clsWebinarIcon-2"/><path id="Path_5967" d="M20 22.9c-.1 0-.19-.05-.24-.13l-1.83-2.6a.29.29 0 0 1 0-.42.29.29 0 0 1 .42 0c.03.02.05.05.06.09l1.83 2.6a.307.307 0 0 1-.25.47" class="clsWebinarIcon-2"/><path id="Path_5968" d="M11.9 22.9c-.17 0-.3-.14-.29-.31 0-.06.02-.11.05-.16l1.83-2.6c.07-.15.25-.22.4-.14.15.07.22.25.14.4-.01.03-.04.06-.06.09l-1.83 2.6c-.06.08-.15.13-.24.12" class="clsWebinarIcon-2"/><path id="Path_5969" d="M21.73 20.29H10.16c-.17 0-.3-.13-.3-.3v-8.68c-.03-.16.08-.32.24-.35s.32.08.35.24v8.48h10.99v-.86c-.03-.16.08-.32.24-.35s.32.08.35.24v1.26c0 .17-.13.3-.3.3" class="clsWebinarIcon-2"/><path id="Path_5970" d="M21.73 15.38c-.17 0-.3-.13-.3-.3v-3.76c-.03-.16.08-.32.24-.35s.32.08.35.24v3.86c0 .17-.13.3-.3.3" class="clsWebinarIcon-2"/><path id="Path_5971" d="M22.6 11.33H9.3a.299.299 0 0 1-.24-.35c.02-.12.12-.22.24-.24h13.3c.16.03.27.18.24.35-.02.12-.12.22-.24.24" class="clsWebinarIcon-2"/><path id="Path_5972" d="M22.6 17.4s-.07 0-.1-.02l-8.1-2.89a.306.306 0 0 1-.11-.41c.06-.11.19-.17.31-.15l8.1 2.89c.15.07.22.25.15.4-.04.1-.14.17-.25.18" class="clsWebinarIcon-2"/></g></g></svg> <h5>Webinars</h5> </a> <a href="/resources/library?resourceType%5B%5D=Data%20Sheet%20/%20Solution%20Brief"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 32 32"><defs><style>.clsdatasheetIcon-2{stroke-width:0;fill:#fff}</style></defs><g id="Group_1938"><circle id="Ellipse_46" cx="16" cy="16" r="16" style="stroke-width:0;fill:#19234d"/><g id="Group_1893"><path id="Path_5952" d="M20.84 22.9H11.6c-.33 0-.6-.27-.6-.6V9.6c0-.33.27-.6.6-.6h5.77c.16-.03.32.08.35.24.03.16-.08.32-.24.35H11.61v12.72h9.24v-9.25c-.03-.16.08-.32.24-.35s.32.08.35.24v9.35c0 .33-.27.59-.59.59" class="clsdatasheetIcon-2"/><path id="Path_5953" d="M21.13 13.35h-3.76c-.17 0-.3-.13-.3-.3V9.29c0-.17.15-.29.31-.29.07 0 .13.03.19.08l3.76 3.76a.3.3 0 0 1-.02.42c-.05.05-.12.07-.19.08m-3.46-.59h2.75L17.66 10v2.75Z" class="clsdatasheetIcon-2"/><path id="Path_5954" d="M17.46 16.06c-.56 0-1.02-.46-1.02-1.02s.46-1.02 1.02-1.02 1.02.46 1.02 1.02-.46 1.02-1.02 1.02m0-1.45c-.24 0-.43.19-.43.43s.19.43.43.43.43-.19.43-.43-.19-.43-.43-.43" class="clsdatasheetIcon-2"/><path id="Path_5955" d="M16.3 18.66c-.56 0-1.02-.46-1.02-1.02s.46-1.02 1.02-1.02 1.02.46 1.02 1.02-.46 1.02-1.02 1.02m0-1.45c-.24 0-.43.19-.43.43s.19.43.43.43.43-.19.43-.43-.19-.43-.43-.43" class="clsdatasheetIcon-2"/><path id="Path_5956" d="M13.7 20.1c-.56 0-1.02-.46-1.02-1.02s.46-1.02 1.02-1.02 1.02.46 1.02 1.02-.46 1.02-1.02 1.02m0-1.44c-.24 0-.43.19-.43.43s.19.43.43.43.43-.19.43-.43-.19-.43-.43-.43" class="clsdatasheetIcon-2"/><path id="Path_5957" d="M18.9 21.26c-.56 0-1.02-.46-1.02-1.02s.46-1.02 1.02-1.02 1.02.46 1.02 1.02-.46 1.02-1.02 1.02m0-1.44c-.24 0-.43.19-.43.43s.19.43.43.43.43-.19.43-.43-.19-.43-.43-.43" class="clsdatasheetIcon-2"/><path id="Path_5958" d="M18.39 20.03c-.08 0-.15-.03-.21-.09l-1.58-1.58a.294.294 0 0 1-.07-.42c.1-.14.28-.17.42-.07.03.02.05.04.07.07l1.58 1.58a.3.3 0 0 1-.02.42c-.05.05-.12.07-.19.08" class="clsdatasheetIcon-2"/><path id="Path_5959" d="M14.33 19.03c-.17 0-.29-.15-.28-.32 0-.1.06-.19.14-.24l1.34-.74a.3.3 0 0 1 .28.52l-1.34.74s-.09.04-.14.04" class="clsdatasheetIcon-2"/><path id="Path_5960" d="M16.58 17.27s-.08 0-.12-.03a.301.301 0 0 1-.15-.39l.58-1.28c.09-.14.28-.17.42-.08.1.07.15.2.12.32l-.58 1.28c-.05.11-.15.17-.27.17" class="clsdatasheetIcon-2"/></g></g></svg> <h5>Data Sheets</h5> </a> <a href="/esentire-mdr-vs-everyone"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 32 32"><defs><style>.clsRealVsFakeIcon-2{stroke-width:0;fill:#fff}</style></defs><g id="Group_1933"><g id="Group_1932"><circle id="Ellipse_48" cx="16" cy="16" r="16" style="stroke-width:0;fill:#19234d"/></g><g id="Group_1924"><path id="Path_6040" d="M16.15 17.96c-.18 0-.32-.15-.32-.32 0-.15.11-.28.25-.31.04 0 1.05-.26 1.13-1.86-.45-.2-.88-.46-1.27-.77-.14-.11-.16-.31-.05-.45s.31-.16.45-.05c.39.31.83.56 1.3.74.13.04.22.16.22.3 0 2.34-1.58 2.69-1.65 2.7h-.06" class="clsRealVsFakeIcon-2"/><path id="Path_6041" d="M16.15 17.96h-.06c-.07-.01-1.65-.36-1.65-2.7 0-.14.09-.26.22-.3.47-.18.91-.43 1.3-.74.14-.11.34-.09.45.05s.09.34-.05.45c-.39.31-.82.56-1.27.77.09 1.63 1.12 1.86 1.13 1.86.17.04.28.21.25.38-.03.15-.16.25-.31.25" class="clsRealVsFakeIcon-2"/><path id="Path_6042" d="M10.38 21.55c-.18 0-.32-.14-.32-.32 0-.08.03-.16.09-.22l3.54-3.54c.13-.12.33-.12.45.01.12.12.12.32 0 .44l-3.54 3.54c-.06.06-.14.09-.23.09" class="clsRealVsFakeIcon-2"/><path id="Path_6043" d="M13.96 20.69c-.18 0-.32-.14-.32-.32v-2.36h-2.36c-.18 0-.33-.12-.34-.3s.12-.33.3-.34h2.72c.18 0 .32.14.32.32v2.68c0 .18-.14.32-.32.32" class="clsRealVsFakeIcon-2"/><path id="Path_6044" d="M18.18 14.14c-.18 0-.32-.14-.32-.32 0-.08.03-.16.09-.22l3.54-3.54c.13-.12.33-.12.45.01.12.12.12.32 0 .44l-3.54 3.54c-.06.06-.14.09-.23.09" class="clsRealVsFakeIcon-2"/><path id="Path_6045" d="M20.72 14.28h-2.68c-.18 0-.32-.14-.32-.32v-2.68c0-.18.12-.33.3-.34.18 0 .33.12.34.3v2.4h2.36c.18 0 .33.12.34.3 0 .18-.12.33-.3.34h-.04" class="clsRealVsFakeIcon-2"/><path id="Path_6046" d="M16 25.03c-.18 0-.32-.14-.32-.32v-1.74c0-.18.12-.33.3-.34.18 0 .33.12.34.3v1.78c0 .18-.14.32-.32.32" class="clsRealVsFakeIcon-2"/><path id="Path_6047" d="M16 9.35c-.18 0-.32-.14-.32-.32V7.29c0-.18.12-.33.3-.34.18 0 .33.12.34.3v1.78c0 .18-.14.32-.32.32" class="clsRealVsFakeIcon-2"/><path id="Path_6048" d="M24.71 16.32h-1.74c-.18 0-.33-.12-.34-.3s.12-.33.3-.34h1.78c.18 0 .33.12.34.3s-.12.33-.3.34h-.04" class="clsRealVsFakeIcon-2"/><path id="Path_6049" d="M9.03 16.32H7.29c-.18 0-.33-.12-.34-.3s.12-.33.3-.34h1.78c.18 0 .33.12.34.3s-.12.33-.3.34h-.04" class="clsRealVsFakeIcon-2"/><path id="Path_6050" d="M9.72 18.97a.32.32 0 0 1-.29-.19c-1.53-3.63.18-7.82 3.81-9.35 1.77-.75 3.77-.75 5.54 0 .17.06.25.24.19.41-.06.17-.24.25-.41.19 0 0-.02 0-.03-.01-3.31-1.4-7.12.15-8.52 3.46a6.53 6.53 0 0 0 0 5.06c.07.16 0 .35-.17.42-.04.02-.08.02-.12.03" class="clsRealVsFakeIcon-2"/><path id="Path_6051" d="M16 23.14c-.95 0-1.9-.19-2.77-.56a.315.315 0 0 1-.19-.41c.06-.17.24-.25.41-.19 0 0 .02 0 .03.01a6.499 6.499 0 0 0 8.66-8.15.31.31 0 0 1 .22-.39c.15-.04.31.03.38.18 1.31 3.72-.64 7.8-4.36 9.11-.76.27-1.56.41-2.37.41" class="clsRealVsFakeIcon-2"/><path id="Path_6052" d="M12.21 15.94c-.18 0-.32-.14-.32-.32a3.73 3.73 0 0 1 3.73-3.73c.18 0 .31.16.3.34 0 .16-.14.29-.3.3-1.71 0-3.09 1.38-3.09 3.09 0 .18-.14.32-.32.32" class="clsRealVsFakeIcon-2"/><path id="Path_6053" d="M16.38 20.11c-.18 0-.31-.16-.3-.34 0-.16.14-.29.3-.3 1.71 0 3.09-1.38 3.09-3.09 0-.18.12-.33.3-.34.18 0 .33.12.34.3v.04a3.73 3.73 0 0 1-3.73 3.73" class="clsRealVsFakeIcon-2"/></g></g></svg> <h5>Real vs. Fake MDR</h5> </a> <a href="/esentire-mdr-vs-everyone/compare"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" data-name="Layer 1" version="1.1" viewBox="0 0 32 32"><defs><style>.cls-Comparison-2{stroke-width:0;fill:#fff}</style></defs><g id="Group_1933" data-name="Group 1933"><g id="Group_1932" data-name="Group 1932"><circle id="Ellipse_48" cx="16" cy="16" r="16" data-name="Ellipse 48" style="stroke-width:0;fill:#19234d"/></g><path d="M18.2 18.2c.2 0 .3-.1.3-.3v-7.1h3v7.1c0 .2.1.3.3.3s.3-.1.3-.3v-7.4c0-.2-.1-.3-.3-.3h-3.7c-.2 0-.3.1-.3.3v7.4c0 .2.1.3.3.3Z" class="cls-Comparison-2"/><path d="M20.1 24.1c.1 0 .2 0 .3-.1l4.4-5.9v-.3c0-.1-.2-.2-.3-.2h-2.6c-.2 0-.3.1-.3.3s.1.3.3.3h1.9l-3.8 5-3.8-5h1.9c.2 0 .3-.1.3-.3s-.1-.3-.3-.3h-2.6c-.1 0-.2 0-.3.2v.3l4.4 5.9s.2.1.3.1ZM10.1 21.9h3.7c.2 0 .3-.1.3-.3v-7.4c0-.2-.1-.3-.3-.3s-.3.1-.3.3v7.1h-3v-7.1c0-.2-.1-.3-.3-.3s-.3.1-.3.3v7.4c0 .2.1.3.3.3Z" class="cls-Comparison-2"/><path d="M7.5 14.5h2.6c.2 0 .3-.1.3-.3s-.1-.3-.3-.3H8.2l3.8-5 3.8 5h-1.9c-.2 0-.3.1-.3.3s.1.3.3.3h2.6c.1 0 .2 0 .3-.2V14l-4.4-5.9s-.2-.1-.3-.1c-.1 0-.2 0-.3.1L7.4 14v.3c0 .1.2.2.3.2Z" class="cls-Comparison-2"/></g></svg> <h5>Compare MDR Vendors</h5> </a> <a class="Resources__Links--Mobile" href="/resources/blog"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 32 32"><defs><clipPath id="clippath"><path d="M9.09 7.71H22.9v16.58H9.09z" style="stroke-width:0;fill:none"/></clipPath><style>.clsBlogNavIcon-4{stroke-width:0;fill:#fff}</style></defs><g id="Layer_1-2"><g id="Group_2087"><g id="Group_1933"><g id="Group_1932"><circle id="Ellipse_48" cx="16" cy="16" r="16" style="fill:#172143;stroke-width:0"/></g><g id="Group_2091" style="clip-path:url(#clippath)"><g id="Group_2090"><path id="Path_6299" d="M15.14 18.51c-.19 0-.34-.15-.34-.34 0-.09.04-.17.1-.24l5.63-5.63c.14-.12.35-.11.48.02.12.13.12.32 0 .45l-5.63 5.63a.35.35 0 0 1-.24.1" class="clsBlogNavIcon-4"/><path id="Path_6300" d="M16.6 19.96c-.19 0-.34-.15-.34-.34 0-.09.04-.17.1-.24l5.63-5.63c.14-.12.35-.11.48.02.12.13.12.32 0 .45l-5.63 5.63a.35.35 0 0 1-.24.1" class="clsBlogNavIcon-4"/><path id="Path_6301" d="M22.27 14.29c-.19 0-.34-.15-.34-.34 0-.09.04-.17.1-.24.27-.27.27-.71 0-.98a.713.713 0 0 0-.98 0c-.12.14-.34.15-.48.02a.335.335 0 0 1-.02-.48l.02-.02c.52-.55 1.38-.58 1.93-.06s.58 1.38.06 1.93l-.06.06a.35.35 0 0 1-.24.1" class="clsBlogNavIcon-4"/><path id="Path_6302" d="M14.27 20.83c-.19 0-.34-.15-.34-.34 0-.04 0-.08.02-.12l.87-2.33c.06-.18.25-.28.42-.22s.28.25.22.42c0 .01 0 .02-.01.03l-.61 1.63 1.63-.61c.18-.05.37.05.42.22a.34.34 0 0 1-.19.41l-2.33.87s-.08.02-.12.02" class="clsBlogNavIcon-4"/><path id="Path_6303" d="M21.18 10.46c-.19 0-.34-.15-.34-.33V8.59c0-.11-.09-.19-.2-.19H13.7a.335.335 0 0 1-.32-.35c0-.17.15-.31.32-.32h6.95c.48 0 .87.39.87.87v1.54c0 .19-.15.34-.33.34" class="clsBlogNavIcon-4"/><path id="Path_6304" d="M20.65 24.29H9.96a.87.87 0 0 1-.87-.87V12.29a.33.33 0 0 1 .32-.35c.19-.01.34.13.35.32v11.17c0 .11.09.19.2.19h10.68c.11 0 .2-.09.2-.19v-5.35a.33.33 0 0 1 .32-.35c.19-.01.34.13.35.32v5.39c0 .48-.39.87-.87.87" class="clsBlogNavIcon-4"/><path id="Path_6305" d="M13.58 12.53H9.43c-.19 0-.34-.15-.33-.34 0-.09.04-.17.1-.24l4.15-4.15c.13-.13.34-.13.48 0 .06.06.1.15.1.24v4.15c0 .19-.15.34-.33.34m-3.36-.67h3v-3l-3 3Z" class="clsBlogNavIcon-4"/><path id="Path_6306" d="M21.53 14.95a.35.35 0 0 1-.24-.1l-1.38-1.38a.335.335 0 0 1-.02-.48c.12-.14.34-.15.48-.02l.02.02 1.38 1.38c.13.13.13.35 0 .48a.35.35 0 0 1-.24.1" class="clsBlogNavIcon-4"/></g></g></g></g></g></svg> <h5>Blogs</h5> </a> <a class="Resources__Links--Mobile" href="/resources/security-advisories"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 32 32"><defs><clipPath id="clippath"><path d="M8.48 6.97h15.04v18.06H8.48z" style="stroke-width:0;fill:none"/></clipPath><style>.clsSANavIconTop-4{stroke-width:0;fill:#fff}</style></defs><g id="Layer_1-2"><g id="Group_2086"><g id="Group_1933"><g id="Group_1932"><circle id="Ellipse_48" cx="16" cy="16" r="16" style="fill:#172143;stroke-width:0"/></g><g id="Group_2089" style="clip-path:url(#clippath)"><g id="Group_2088"><path id="Path_6292" d="M16 25.03c-.19 0-.34-.16-.34-.34 0-.14.09-.27.23-.32 6.93-2.44 6.95-10.6 6.95-10.68 0-.19.15-.34.34-.34.19 0 .34.15.34.34 0 .09-.01 8.73-7.41 11.33-.04.01-.07.02-.11.02" class="clsSANavIconTop-4"/><path id="Path_6293" d="M23.18 14.03c-.19 0-.34-.15-.34-.34V9.93h-1.41c-.19 0-.34-.15-.34-.34s.15-.34.34-.34h1.53c.31 0 .57.26.57.57v3.88c0 .19-.15.34-.34.34" class="clsSANavIconTop-4"/><path id="Path_6294" d="M16 25.03s-.08 0-.11-.02c-7.39-2.6-7.41-11.24-7.41-11.33 0-.18.14-.34.33-.34h.02c.19 0 .34.16.34.34 0 .08.02 8.24 6.95 10.68a.346.346 0 0 1-.11.67" class="clsSANavIconTop-4"/><path id="Path_6295" d="M8.82 14.03c-.19 0-.34-.15-.34-.34V9.81c0-.31.26-.57.57-.57h1.53c.19 0 .34.15.34.34s-.15.34-.34.34H9.16v3.76c0 .19-.15.34-.34.34" class="clsSANavIconTop-4"/><path id="Path_6296" d="M21.4 9.92c-2.02.12-3.99-.64-5.4-2.08a6.978 6.978 0 0 1-5.4 2.08c-.19 0-.34-.15-.34-.34s.15-.34.34-.34c1.39.04 2.76-.33 3.94-1.05.45-.28.84-.63 1.15-1.06.06-.1.17-.16.29-.16h.04c.12 0 .22.06.29.16.32.42.71.78 1.16 1.05 1.18.73 2.55 1.1 3.94 1.05.19 0 .34.15.34.34s-.15.34-.34.34" class="clsSANavIconTop-4"/><path id="Path_6297" d="M16 17.97c-.19 0-.34-.15-.34-.34v-5.4c0-.19.15-.34.34-.34.19 0 .34.15.34.34v5.4c0 .19-.15.34-.34.34" class="clsSANavIconTop-4"/><path id="Path_6298" d="M16.53 19.78c0 .29-.24.53-.53.53s-.53-.24-.53-.53c0-.29.24-.53.53-.53.29 0 .53.24.53.53" class="clsSANavIconTop-4"/></g></g></g></g></g></svg> <h5>Security Advisories</h5> </a> </div> <div class="Resources__BoxCTA"> <a href="/resources/library"> EXPLORE LIBRARY <span>→</span> </a> </div> </div> </div> <div class="Resources__SecurityBox"> <div class="Resources__Links"> <div class="Resources__SecurityBoxAdvisories"> <h6>SECURITY ADVISORIES</h6> <a href="https://www.esentire.com/security-advisories/palo-alto-zero-day-vulnerability-cve-2024-0012"> <span class="Resources__Eyebrow">Nov 18, 2024</span> <h5>Palo Alto Zero-Day Vulnerability (CVE-2024-0012)</h5> <p> THE THREAT On November 18th, 2024, Palo Alto disclosed a critical actively exploited authentication bypass zero-day vulnerability impacting Palo Alto Networks PAN-OS. The…</p> </a> <a href="https://www.esentire.com/security-advisories/poc-released-for-citrix-vulnerabilities"> <span class="Resources__Eyebrow">Nov 13, 2024</span> <h5>PoC Released for Citrix Vulnerabilities</h5> <p> THE THREAT Update: eSentire has observed multiple exploitation attempts targeting CVE-2024-8069. In real-world attacks, threat actors successfully achieved RCE and attempted to…</p> </a> </div> <div class="Resources__BoxCTA"> <a href="/resources/security-advisories"> View Advisories <span>→</span> </a> </div> </div> </div> </div> </div> </div> <!-- Company --> <div class="Company NavBar__SubMenu" data-menu="company"> <div class="Company__Wrapper"> <div class="MobileDropdownNav"> <button class="MobileDropdownNav__BackButton" type="button"> <svg width="6" height="9" viewBox="0 0 6 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M5.92383 7.75391L4.92773 8.75L0.677734 4.5L4.92773 0.25L5.92383 1.24609L2.66992 4.5L5.92383 7.75391Z" fill="#3C2B77"/> </svg> <span>Back</span> </button> <div class="MobileDropdownNav__Title">Company</div> </div> <div class="Company__Content"> <div class="Company__About"> <div class="Company__Links"> <h6>ABOUT ESENTIRE</h6> <p>eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 2000+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.</p> <a href="/company/about-us"><h5>About Us <span class="Resources__LinksArrow"><em>→</em></span></h5></a> <a href="/company/leadership"><h5>Leadership <span class="Resources__LinksArrow"><em>→</em></span></h5></a> <a href="/company/careers"><h5>Careers <span class="Resources__LinksArrow"><em>→</em></span></h5></a> <a class="Company__Links--Mobile" href="/company/event-calendar"><h5>Event Calendar <span class="Resources__LinksArrow"><em>→</em></span></h5></a> <a class="Company__Links--Mobile" href="/company/newsroom"><h5>Newsroom <span class="Resources__LinksArrow"><em>→</em></span></h5></a> </div> </div> <div class="Company__Calendar"> <div class="Company__Links"> <h6>EVENT CALENDAR</h6> <div class="Company__Event"> <div class="Company__CalendarDate"> <div class="Company__Month">Nov</div> <div class="Company__Day">21</div> </div> <h5>SkyHigh Cook Out</h5> </div> <div class="Company__Event"> <div class="Company__CalendarDate"> <div class="Company__Month">Dec</div> <div class="Company__Day">04</div> </div> <h5>TechTalk Soho House Dinner, Chicago</h5> </div> <div class="Company__Event"> <div class="Company__CalendarDate"> <div class="Company__Month">Dec</div> <div class="Company__Day">10</div> </div> <h5>December TRU Intelligence Briefing</h5> </div> <div class="Company__Event"> <div class="Company__CalendarDate"> <div class="Company__Month">Jan</div> <div class="Company__Day">15</div> </div> <h5>Security Leaders Dinner, Denver</h5> </div> <div class="Company__Event"> <div class="Company__CalendarDate"> <div class="Company__Month">Jan</div> <div class="Company__Day">16</div> </div> <h5>FutureCon Los&nbsp;Angeles</h5> </div> </div> <div class="Company__BoxCTA"> <a href="/company/event-calendar"> View Calendar <span>→</span> </a> </div> </div> <div class="Company__PressRelease"> <div class="Company__Links"> <h6>LATEST PRESS RELEASE</h6> <a href="https://www.esentire.com/news-releases/esentire-expands-partnership-with-td-synnex-to-bring-esentires-award-winning-24-7-mdr-and-soc-services-to-organizations-across-north-america"> <span class="Resources__Eyebrow">Aug 09, 2024</span> <h5>eSentire Expands Partnership with TD SYNNEX to Bring eSentire’s Award-Winning, 24/7 MDR and SOC Services to Organizations Across North America</h5> <p> Waterloo, Ontario, August 12, 2024 — eSentire, a leading global Managed Detection and Response (MDR) provider, today announced it has expanded its partnership with TD SYNNEX, a leading global distributor and solutions aggregator for the IT ecosystem. eSentire’s all-in-one, 24/7…</p> </a> </div> <div class="Company__BoxCTA"> <a href="/company/newsroom"> View Newsroom <span>→</span> </a> </div> </div> </div> </div> </div> <!-- Partners --> <div class="Partners NavBar__SubMenu" data-menu="partners"> <div class="Partners__Wrapper"> <div class="MobileDropdownNav"> <button class="MobileDropdownNav__BackButton" type="button"> <svg width="6" height="9" viewBox="0 0 6 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M5.92383 7.75391L4.92773 8.75L0.677734 4.5L4.92773 0.25L5.92383 1.24609L2.66992 4.5L5.92383 7.75391Z" fill="#3C2B77"/> </svg> <span>Back</span> </button> <div class="MobileDropdownNav__Title">Partners</div> </div> <div class="Partners__Content"> <div class="Partners__PartnerProgram"> <div class="Partners__Links"> <h6>PARTNER PROGRAM</h6> <div class="Partners__E3Logo"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 119 81.99"><defs><style>.clsEcosystemICON-1{fill:#19234d;stroke-width:0}</style></defs><path d="M39.47 6.27C34.44-.18 25.91-.12 25.91-.12h-8.54S8.84-.18 3.81 6.27C.73 10.21.06 13.97.06 16.59v20.98c0 2.62.67 6.39 3.74 10.32 5.04 6.45 13.56 6.39 13.56 6.39H43.2V42.17H19.95s-3.4.02-5.41-2.55c-1.22-1.57-1.49-3.07-1.49-4.11v-2.45H43.2V16.59c0-2.62-.67-6.39-3.74-10.32M13.04 17.91c0-1.04.27-2.55 1.49-4.11 2-2.57 5.41-2.55 5.41-2.55h3.4s3.4-.02 5.41 2.55c1.22 1.57 1.49 3.07 1.49 4.11v3.2h-17.2v-3.2Z" class="clsEcosystemICON-1"/><path d="m75.52 49.25 7.45-10.32c1.97 1.69 3.87 2.95 5.67 3.77 1.8.82 3.75 1.23 5.84 1.23s4.02-.55 5.63-1.65 2.41-2.86 2.41-5.29c0-1.64-.64-3.14-1.91-4.53-1.27-1.38-3.06-2.07-5.37-2.07-1.3 0-2.47.13-3.51.38-1.04.26-1.76.5-2.16.72l-3.22-5.25 13.54-12.53H80.17V1.6h35.12v9.82l-10.32 11.17c3.72.96 6.64 2.82 8.76 5.58 2.12 2.76 3.18 6.23 3.18 10.41 0 2.82-.61 5.33-1.82 7.53s-2.85 4.05-4.91 5.54-4.35 2.64-6.85 3.43a25.41 25.41 0 0 1-7.66 1.19c-4.01 0-7.74-.61-11.21-1.82-3.47-1.21-6.45-2.95-8.93-5.2Z" style="fill:#40c3d9;stroke-width:0"/><path d="M59.98 0h.76v54.89h-.76z" style="fill:#9ea1aa;stroke-width:0"/><path d="m7.59 76.12.62.53c-.39.48-.92.86-1.59 1.15s-1.35.43-2.05.43c-.88 0-1.67-.2-2.36-.59S.97 76.69.59 75.98s-.58-1.53-.58-2.45c0-.87.18-1.66.55-2.37s.87-1.28 1.52-1.7c.66-.42 1.4-.63 2.25-.63s1.55.19 2.2.56c.65.38 1.15.93 1.52 1.66.37.73.55 1.64.55 2.71H.97c.03.67.19 1.29.5 1.84.3.55.72.99 1.25 1.32s1.15.5 1.85.5c.56 0 1.12-.12 1.7-.35.58-.23 1.01-.55 1.31-.93Zm-6.6-3.13h6.65c-.12-1.09-.47-1.92-1.06-2.5-.59-.58-1.35-.87-2.26-.87-.64 0-1.2.15-1.68.46-.48.3-.87.71-1.15 1.22-.29.51-.45 1.07-.49 1.69ZM21.68 76.12l.62.55c-.36.45-.85.83-1.47 1.12-.62.29-1.31.44-2.07.44-.87 0-1.64-.21-2.31-.62s-1.2-.98-1.59-1.69c-.39-.71-.58-1.51-.58-2.39s.2-1.69.59-2.4c.4-.71.93-1.27 1.61-1.68.68-.42 1.44-.62 2.28-.62.79 0 1.46.14 2.01.42.55.28 1.02.66 1.41 1.15l-.66.51c-.3-.39-.67-.7-1.12-.92s-.99-.34-1.64-.34c-.69 0-1.3.18-1.84.53s-.96.82-1.26 1.41c-.3.59-.46 1.24-.46 1.95s.16 1.35.47 1.94.74 1.06 1.27 1.42c.54.36 1.14.53 1.82.53s1.22-.12 1.72-.35c.5-.23.9-.55 1.2-.93ZM31.81 78.22c-.84 0-1.61-.21-2.31-.63a4.693 4.693 0 0 1-2.29-4.07c0-.87.21-1.66.62-2.37.42-.71.97-1.28 1.67-1.7s1.47-.63 2.31-.63 1.63.21 2.32.63c.69.42 1.25.99 1.66 1.7s.62 1.5.62 2.37-.21 1.66-.62 2.37c-.42.71-.97 1.28-1.66 1.7s-1.47.63-2.32.63Zm0-.8c.7 0 1.33-.18 1.89-.53.56-.35 1-.82 1.32-1.42s.48-1.25.48-1.96-.16-1.35-.5-1.93c-.33-.59-.77-1.07-1.33-1.43s-1.18-.55-1.87-.55-1.33.18-1.89.53c-.56.35-1 .82-1.32 1.41-.32.59-.48 1.25-.48 1.97s.16 1.35.5 1.94.78 1.07 1.34 1.43c.56.36 1.18.55 1.86.55ZM41.99 76.86l.56-.62c.38.38.81.66 1.29.87s1.06.3 1.72.3c.48 0 .92-.06 1.33-.18s.74-.31.98-.55c.25-.25.37-.56.37-.93 0-.44-.11-.77-.34-1-.23-.22-.57-.41-1.02-.55-.45-.14-1.01-.28-1.67-.44a8.86 8.86 0 0 1-1.45-.46c-.42-.18-.75-.42-1-.75-.25-.32-.37-.76-.37-1.3s.16-1 .47-1.36c.31-.36.72-.63 1.22-.81s1.03-.26 1.6-.26c.69 0 1.3.13 1.85.39s.98.59 1.32.99l-.6.55c-.31-.34-.67-.61-1.08-.82s-.9-.31-1.47-.31c-.38 0-.75.04-1.12.13-.37.08-.68.25-.92.49-.25.24-.37.59-.37 1.06 0 .38.14.67.41.9s.62.4 1.05.53.87.25 1.32.35c.49.1.98.24 1.46.42s.88.43 1.2.76c.32.33.48.79.48 1.39s-.18 1.09-.53 1.48c-.35.39-.8.67-1.34.85-.55.18-1.11.27-1.69.27-.83 0-1.54-.12-2.14-.37s-1.1-.58-1.52-.99ZM54.2 81.5l.45-.62c.12.12.28.22.48.31.21.09.43.14.68.14.39 0 .69-.14.9-.41s.42-.66.61-1.17l.74-1.89-3.99-8.82h.99l3.44 7.76 2.97-7.76h.95L58.03 80.1c-.1.26-.24.55-.42.85-.18.31-.41.58-.7.81-.29.22-.66.34-1.12.34-.36 0-.67-.06-.93-.18s-.49-.26-.68-.43ZM67.15 76.86l.56-.62c.38.38.81.66 1.29.87s1.06.3 1.72.3c.48 0 .92-.06 1.33-.18.41-.12.74-.31.98-.55.25-.25.37-.56.37-.93 0-.44-.11-.77-.34-1-.23-.22-.57-.41-1.02-.55s-1.01-.28-1.67-.44a8.86 8.86 0 0 1-1.45-.46c-.42-.18-.75-.42-1-.75s-.37-.76-.37-1.3.16-1 .47-1.36c.31-.36.72-.63 1.22-.81s1.03-.26 1.6-.26c.69 0 1.3.13 1.85.39s.98.59 1.32.99l-.6.55c-.31-.34-.67-.61-1.08-.82-.41-.21-.9-.31-1.47-.31-.38 0-.75.04-1.12.13s-.68.25-.92.49c-.25.24-.37.59-.37 1.06 0 .38.14.67.41.9s.62.4 1.05.53.87.25 1.32.35c.49.1.98.24 1.46.42s.88.43 1.2.76c.32.33.48.79.48 1.39s-.18 1.09-.53 1.48c-.35.39-.8.67-1.34.85-.55.18-1.11.27-1.69.27-.83 0-1.54-.12-2.14-.37s-1.1-.58-1.52-.99ZM81.36 75.24v-5.39h-1.79v-.82h1.79v-2.95h.87v2.95h2.95v.82h-2.95v5.17c0 .7.07 1.22.21 1.57s.34.57.57.67c.24.1.51.16.83.16s.6-.06.83-.18c.23-.12.47-.32.7-.6l.55.53c-.26.34-.55.59-.88.78s-.76.27-1.29.27c-.47 0-.88-.08-1.24-.25s-.64-.47-.85-.9c-.2-.43-.3-1.04-.3-1.83ZM98 76.12l.62.53c-.39.48-.92.86-1.59 1.15s-1.35.43-2.05.43c-.88 0-1.67-.2-2.36-.59s-1.24-.95-1.62-1.66-.58-1.53-.58-2.45c0-.87.18-1.66.55-2.37.36-.71.87-1.28 1.52-1.7.66-.42 1.4-.63 2.25-.63s1.55.19 2.2.56 1.16.93 1.52 1.66.55 1.64.55 2.71h-7.62c.03.67.19 1.29.5 1.84.3.55.72.99 1.25 1.32s1.15.5 1.85.5c.56 0 1.12-.12 1.7-.35.58-.23 1.01-.55 1.31-.93Zm-6.59-3.13h6.65c-.12-1.09-.47-1.92-1.06-2.5-.59-.58-1.35-.87-2.26-.87-.64 0-1.2.15-1.68.46-.48.3-.87.71-1.15 1.22-.29.51-.45 1.07-.49 1.69ZM105.17 77.98v-8.16c0-.23-.01-.49-.04-.78h.82c.03.29.04.54.05.77s.01.59.01 1.1c.14-.27.35-.57.63-.9s.64-.61 1.1-.85 1-.36 1.65-.36c.87 0 1.53.18 1.98.55s.77.88.95 1.54c.13-.24.35-.53.66-.85s.71-.61 1.19-.87c.48-.25 1.04-.38 1.67-.38.8 0 1.43.16 1.89.48s.79.77.97 1.36c.19.59.28 1.29.28 2.09v5.25h-.87v-4.96c0-.9-.1-1.59-.28-2.08-.19-.49-.46-.83-.81-1.03s-.79-.29-1.3-.29c-.58 0-1.12.15-1.6.46s-.87.7-1.17 1.19-.44 1.01-.44 1.57v5.15h-.88v-4.96c0-.9-.09-1.59-.27-2.08s-.45-.83-.8-1.03-.79-.29-1.3-.29c-.71 0-1.31.19-1.79.58s-.84.87-1.08 1.45c-.24.58-.36 1.15-.36 1.72v4.61h-.88Z" class="clsEcosystemICON-1"/></svg> <div class="Partners__E3LogoInner"> <p>We provide sophisticated cybersecurity solutions for Managed Security Service Providers (MSSPs), Managed Service Providers (MSPs), and Value-Added Resellers (VARs). Find out why you should partner with eSentire, the Authority in Managed Detection and Response, today.</p> <div class="Partners__BoxCTA"> <a href="/partners"> LEARN MORE <span>→</span> </a> </div> </div> </div> </div> </div> <div class="Partners__Box"> <div class="Partners__BoxInner"> <div class="Partners__BoxLeft"> <div class="Partners__Links"> <a href="/partners/become-a-partner"> <p>Apply to become an e3 ecosystem partner with eSentire today.</p> </a> </div> </div> <div class="Partners__BoxRight"> <a href="/partners/become-a-partner">APPLY NOW <span>→</span></a> </div> </div> <div class="Partners__BoxInner"> <div class="Partners__BoxLeft"> <div class="Partners__Links"> <a href="https://esentire.channeltivity.com/Login" target="_blank"> <p>Login to the Partner Portal for resources and content for current partners.</p> </a> </div> </div> <div class="Partners__BoxRight"> <a href="https://esentire.channeltivity.com/Login" target="_blank">LOGIN NOW <span>→</span></a> </div> </div> </div> </div> </div> </div> <!-- SEARCH --> <div class="Search NavBar__SubMenu" data-menu="search"> <div class="Search__Wrapper"> <div class="MobileDropdownNav"> <button class="MobileDropdownNav__BackButton" type="button"> <svg width="6" height="9" viewBox="0 0 6 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M5.92383 7.75391L4.92773 8.75L0.677734 4.5L4.92773 0.25L5.92383 1.24609L2.66992 4.5L5.92383 7.75391Z" fill="#3C2B77"/> </svg> <span>Back</span> </button> <div class="MobileDropdownNav__Title">Search</div> </div> <div class="Search__Content"> <h3>Search our site</h3> <form action="/search/results" class="filter"> <div class="Search__TopField"> <svg xmlns="http://www.w3.org/2000/svg" width="24.417" height="24.416"><g data-name="Group 92" fill="none" stroke="#000" stroke-linecap="round" stroke-linejoin="round" stroke-width="2"><path data-name="Path 4" d="M19.7 10.351a9.352 9.352 0 1 0-9.349 9.349 9.353 9.353 0 0 0 9.349-9.349Z"/><path data-name="Line 1" d="m17.723 17.722 5.28 5.28"/></g></svg> <input id="searchField" type="search" name="q" placeholder="Enter a keyword" class="Search__SearchField" autofocus> <input type="submit" value="Search" class="Search__SubmitButton"> </div> </form> <h4>Quick Links</h4> <div class="Search__QuickLinks"> <a class="Search__QuickLink" href="/what-we-do/esentire-managed-detection-and-response"> <h5>ALL-IN-ONE MDR SERVICE <span>→</span></h5> <p>Multi-Signal MDR with 300+ technology integrations to support your existing investments.</p> </a> <a class="Search__QuickLink" href="/what-we-do/security-operations-center"> <h5>24/7 SOC SUPPORT <span>→</span></h5> <p>24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.</p> </a> <a class="Search__QuickLink" href="/how-we-do-it/mdr-pricing-packaging"> <h5>ESENTIRE MDR PRICING <span>→</span></h5> <p>Three MDR package tiers are available based on per-user pricing and level of risk tolerance.</p> </a> <a class="Search__QuickLink" href="/resources/tru-intelligence-center"> <h5>TRU INTELLIGENCE CENTER <span>→</span></h5> <p>The latest security advisories, blogs, reports, industry publications and webinars published by TRU.</p> </a> <a class="Search__QuickLink" href="/esentire-mdr-vs-everyone/compare"> <h5>MDR VENDOR COMPARISONS <span>→</span></h5> <p>Compare eSentire to other Managed Detection and Response vendors to see how we stack up against the competition.</p> </a> <a class="Search__QuickLink" href="/resources/mdr-and-cybersecurity-case-studies"> <h5>MDR CASE STUDIES <span>→</span></h5> <p>See why 2000+ organizations globally have chosen eSentire for their MDR Solution.</p> </a> </div> </div> </div> </div> <!-- Get Started Nav --> <div class="GetStartedNav NavBar__SubMenu" data-menu="getStarted"> <div class="GetStartedNav__Wrapper"> <div class="MobileDropdownNav"> <button class="MobileDropdownNav__BackButton" type="button"> <svg width="6" height="9" viewBox="0 0 6 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M5.92383 7.75391L4.92773 8.75L0.677734 4.5L4.92773 0.25L5.92383 1.24609L2.66992 4.5L5.92383 7.75391Z" fill="#3C2B77"/> </svg> <span>Back</span> </button> <div class="MobileDropdownNav__Title">Get Started</div> </div> <div class="GetStartedNav__Content"> <div class="GetStartedNav__Links"> <a href="/get-started"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 51 51"><path d="M5 0h46v51H5c-2.76 0-5-2.24-5-5V5c0-2.76 2.24-5 5-5Z" style="fill:#263c91;stroke-width:0"/><path d="M33.11 16.61a7.879 7.879 0 0 0-5.79-2.73h-3.65a7.879 7.879 0 0 0-5.79 2.73 7.08 7.08 0 0 0-1.6 4.41v8.96c.02 1.61.58 3.16 1.6 4.41a7.879 7.879 0 0 0 5.79 2.73H34.7v-5.17h-9.92c-.89-.02-1.73-.42-2.31-1.09a2.81 2.81 0 0 1-.64-1.75v-1.05h12.86v-7.03a7.102 7.102 0 0 0-1.6-4.41m-11.26 4.97c0-.64.23-1.26.64-1.76.58-.67 1.42-1.07 2.31-1.09h1.45c.89.02 1.72.41 2.3 1.09.41.5.63 1.12.64 1.76v1.36h-7.34v-1.36Z" style="fill:none;stroke:#fff;stroke-linecap:round;stroke-linejoin:round"/></svg> <h5>Get Started <span class="GetStartedNav__LinksArrow"><em>→</em></span></h5> </a> <a href="/build-a-quote"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 51 51"><defs><style>.clsNavBAQ-1{fill:#fff;stroke-width:0}</style></defs><g id="Group_2081"><path id="Rectangle_3064" d="M5 0h46v51H5c-2.76 0-5-2.24-5-5V5c0-2.76 2.24-5 5-5Z" style="fill:#696de3;stroke-width:0"/><g id="Group_2077"><path id="Path_1056" d="M19.7 22.53a1.14 1.14 0 1 1 1.14-1.14c0 .63-.51 1.14-1.14 1.14m-.04-1.14s.02.04.03.04l-.04-.04Z" class="clsNavBAQ-1"/><path id="Path_1057" d="M19.7 26.93a1.14 1.14 0 1 1 1.14-1.14c0 .63-.51 1.14-1.14 1.14m-.04-1.14s.02.04.03.04l-.04-.04Z" class="clsNavBAQ-1"/><path id="Path_1058" d="M26.29 39.01H15.88c-.32 0-.59-.26-.59-.59V14.8c0-.32.26-.59.58-.59h4.56a.591.591 0 0 1 0 1.18h-3.98v22.46h9.83a.591.591 0 0 1 0 1.18" class="clsNavBAQ-1"/><path id="Path_1059" d="M34.56 29.68c-.32 0-.59-.26-.59-.59v-13.7H30a.591.591 0 0 1 0-1.18h4.56c.32 0 .59.26.59.59v14.29c0 .32-.26.59-.59.59" class="clsNavBAQ-1"/><path id="Path_1060" d="M27.86 17.04h-5.28c-1.26.03-2.31-.97-2.35-2.24v-1.65a.591.591 0 0 1 1.18 0v1.65c.03.62.56 1.09 1.17 1.06h5.27c.62.03 1.15-.44 1.18-1.06v-1.65a.591.591 0 0 1 1.18 0v1.65a2.306 2.306 0 0 1-2.35 2.24" class="clsNavBAQ-1"/><path id="Path_1061" d="M29.59 13.74h-8.77a.591.591 0 0 1 0-1.18h8.77a.591.591 0 0 1 0 1.18" class="clsNavBAQ-1"/><path id="Path_1062" d="M31.27 21.99h-7.72a.591.591 0 0 1 0-1.18h7.72a.591.591 0 0 1 0 1.18" class="clsNavBAQ-1"/><path id="Path_1063" d="M31.27 26.38h-7.72a.591.591 0 0 1 0-1.18h7.72a.591.591 0 0 1 0 1.18" class="clsNavBAQ-1"/><path id="Path_1064" d="M19.7 31.32a1.14 1.14 0 1 1 1.14-1.14c0 .63-.51 1.14-1.14 1.14m-.04-1.13s.02.04.03.04l-.04-.04Z" class="clsNavBAQ-1"/><path id="Path_1065" d="M31.27 30.77h-7.72a.591.591 0 0 1 0-1.18h7.72a.591.591 0 0 1 0 1.18" class="clsNavBAQ-1"/><path id="Path_1066" d="M31.41 39.02c-.15 0-.29-.06-.4-.16l-3.44-3.23a.595.595 0 0 1 .02-.83c.22-.2.55-.21.78-.03l2.93 2.75 3.87-6c.18-.27.54-.35.81-.17.27.18.35.54.17.81l-4.25 6.59c-.09.15-.25.24-.42.26h-.07" class="clsNavBAQ-1"/></g></g></svg> <h5>Build A Quote <span class="GetStartedNav__LinksArrow"><em>→</em></span></h5> </a> <a href="/partners/become-a-partner"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 51 51"><defs><style>.clsBecomePartner-2{stroke-width:0;fill:#fff}</style></defs><g id="Group_2082"><path id="Path_6059" d="M5 0h46v51H5c-2.76 0-5-2.24-5-5V5c0-2.76 2.24-5 5-5Z" style="stroke-width:0;fill:#40c3d9"/><g id="Group_2079"><path id="Path_1068" d="M33.34 34.79c-1.12-.1-2.12-.75-2.67-1.73l-3.12-4.12a.633.633 0 0 1 .12-.88c.27-.21.66-.16.87.12l3.16 4.18c.07.12.97 1.57 2.14 1.06.5-.22.81-.73.76-1.28-.03-.42-.17-.82-.41-1.16l-6.78-9.69c-.73.55-1.52 1.03-2.35 1.42-2.03.97-3.61 1.12-4.68.44-.75-.5-1.18-1.36-1.14-2.26 0-.69.56-1.07 1.41-1.65a19.46 19.46 0 0 0 3.03-2.47c.45-.45.83-.84 1.15-1.18 1.39-1.43 1.91-1.97 3.21-1.97h1.51c1.67-.14 3.34.35 4.66 1.39l.26.18c2.35 1.57 3.14 2.14 3.14 2.14.16.12.26.31.26.51v11.77c0 .35-.28.63-.62.63h-2.07l.02.04c.4.55.62 1.21.65 1.89.05 1.05-.55 2.01-1.52 2.43-.31.14-.66.22-1 .22m.99-5.85h2.32V18.15c-.39-.27-1.25-.87-2.84-1.93l-.26-.18a5.42 5.42 0 0 0-3.97-1.17h-1.51c-.75 0-.99.23-2.31 1.59-.33.34-.71.73-1.17 1.19-.98.98-2.06 1.85-3.21 2.62-.32.19-.61.42-.88.68 0 .45.21.88.57 1.14.38.24 1.34.5 3.47-.51.94-.44 1.81-1 2.6-1.66a.624.624 0 0 1 .93.1l6.25 8.94Z" class="clsBecomePartner-2"/><path id="Path_1069" d="M29.79 36.38c-.15 0-.31-.02-.46-.05-.74-.19-1.38-.65-1.81-1.28l-3.57-5.1a.625.625 0 0 1 1.02-.72l3.58 5.12c.35.68 1.19.94 1.86.58.03-.01.05-.03.08-.04.53-.35.52-.86.45-1.4v-.13c-.04-.34.21-.65.55-.68.34-.04.65.21.68.55v.01l-.62.06.64.04c.21.99-.18 2.01-1.01 2.59-.41.28-.9.44-1.4.45" class="clsBecomePartner-2"/><path id="Path_1070" d="M25.76 36.87c-.66.01-1.3-.25-1.76-.73l-3.62-5.17a.625.625 0 0 1 1.02-.72l3.58 5.11c.48.35 1.13.36 1.62.02.35-.19.58-.54.63-.93.08-.34.42-.54.76-.46.34.08.54.42.46.76v.02c-.14.74-.61 1.38-1.29 1.73-.44.22-.92.35-1.41.35" class="clsBecomePartner-2"/><path id="Path_1071" d="M21.81 37.38c-.78-.01-1.51-.41-1.93-1.06l-2.95-4.2c-.39-.65-1.41-1.9-2.17-1.9h-1.02c-.35 0-.63-.28-.62-.63V17.83c0-.35.28-.63.62-.63h3.07c.69-.04 1.37-.2 2-.49 1.8-.74 3.73-1.09 5.67-1.04.35-.01.64.26.65.6s-.26.64-.6.65h-.05c-1.79-.05-3.57.28-5.22.96-.77.35-1.6.55-2.45.58h-2.44v10.51h.4c1.67 0 3.06 2.22 3.21 2.47l2.95 4.19c.34.53 1.05.68 1.58.34a.55.55 0 0 0 .09-.07c.34-.16.6-.43.75-.77a.622.622 0 1 1 1.18.4c-.24.64-.71 1.16-1.32 1.47-.42.25-.9.39-1.39.4" class="clsBecomePartner-2"/></g></g></svg> <h5>Become A Partner <span class="GetStartedNav__LinksArrow"><em>→</em></span></h5> </a> </div> </div> </div> </div> <script> let buttonSubtles = document.querySelectorAll('.NavBar__ButtonSubtleTrigger'); let subMenus = document.querySelectorAll('.NavBar__SubMenu'); let mobileHamburgers = document.querySelectorAll('.NavBar__MobileNavicon'); let mobileHamburgerBacks = document.querySelectorAll('.MobileDropdownNav__BackButton'); function closeNavigation() { subMenus.forEach(subMenu => { subMenu.classList.remove('active'); }); buttonSubtles.forEach(buttonSubtleparent => { buttonSubtleparent.parentNode.classList.remove("active"); }); } buttonSubtles.forEach(buttonSubtle => { buttonSubtle.addEventListener('click', (e) => { e.preventDefault(); const id = buttonSubtle.getAttribute('data-nav'); if(document.querySelector(`.NavBar__SubMenu[data-menu="${id}"]`).classList.contains('active')) { document.querySelector(`.NavBar__SubMenu[data-menu="${id}"]`).classList.remove('active'); buttonSubtle.parentNode.classList.remove("active"); } else { closeNavigation(); document.querySelector(`.NavBar__SubMenu[data-menu="${id}"]`).classList.add('active'); buttonSubtle.parentNode.classList.add("active"); } }); }); mobileHamburgers.forEach(mobileHamburger => { mobileHamburger.addEventListener('click', (e) => { e.preventDefault(); if(document.getElementsByClassName("NavBar__MobileDropdown")[0].classList.contains("NavBar__MobileDropdown--Visible")) { subMenus.forEach(subMenu => { subMenu.classList.remove('active'); }); } mobileHamburger.parentNode.classList.toggle("NavBar__MobileNavicon--Close"); document.getElementsByClassName("NavBar__MobileDropdown")[0].classList.toggle("NavBar__MobileDropdown--Visible"); }); }); mobileHamburgerBacks.forEach(mobileHamburgerBack => { mobileHamburgerBack.addEventListener('click', (e) => { e.preventDefault(); closeNavigation(); }); }); let navigation = document.getElementsByClassName("NavBar")[0]; // Event listener for clicking outside the navigation document.addEventListener('click', (event) => { if (!navigation.contains(event.target)) { if(!event.target.matches('.Search__SearchField')) { if(!event.target.matches('.Search__TopField svg')) { closeNavigation(); } } } }); </script> <section class="MDRIntro MDRIntro__DFIR"> <video autoplay="" muted="" loop=""> <source src="https://s3.ca-central-1.amazonaws.com/esentire-dot-com-assets/assetsV4/Common/MDR/MDR_Hero_Animation-Min.mp4" type="video/mp4"> </video> <div class="MDRIntro__ContentTopGradient"></div> <div class="MDRIntro__Content"> <div class="Breadcrumb"> <a href="/">Home</a> <a href="/what-we-do">What We Do</a> <a href="">DFIR</a> </div> <div class="MDRIntro__Container"> <div class="MDRIntro__ContainerLeft"> <h1 class="eyebrow">DIGITAL FORENSICS & INCIDENT RESPONSE</h1> <h2>Be Ready With the World's Fastest Threat Suppression</h2> <p>Stop attackers in their tracks with our 4-hour remote threat suppression commitment so you can recover more effectively. eSentire Digital Forensics and Incident Response services are available for On‑Demand 24/7 Incident Response as a retainer offering, or for Emergency Incident Response support.</p> <a class="MDRIntro__Btn MDRIntro__Btn--Desktop" href="/get-started">GET STARTED</a> </div> <div class="MDRIntro__ContainerRight"> <div class="MDRIntro__ContainerRightBox Video-Btn" data-modal-video="video-a4yo6b4wjp" data-modal-video-id="a4yo6b4wjp"> <div class="HeadingVideo__PreviewVideo PreviewVideo"> <div class="wistia_embed wistia_async_zlq6r14whf"> </div> <svg data-name="play-icon-svg" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 41.38 41.18"><defs><style>.play-icon-svg-1{fill:none}</style></defs><g id="Group_1246" data-name="Group 1246"><g id="Group_1245" data-name="Group 1245"><path id="Path_4266-2" data-name="Path 4266-2" d="M20.69.58c11.04 0 19.99 8.95 19.99 19.99s-8.95 19.99-19.99 19.99S.7 31.61.7 20.57 9.65.58 20.69.58" style="fill:#696de3"></path><path id="Path_4267" data-name="Path 4267" d="M40.68 20.41H.7C.59 31.45 9.45 40.49 20.49 40.6c11.04.11 20.08-8.75 20.19-19.79v-.4" style="fill:#787be6"></path><path id="Path_4268" data-name="Path 4268" d="M15.16 31.82c-.19 0-.37-.04-.54-.13-.39-.2-.64-.6-.64-1.04V10.48c0-.44.25-.84.64-1.04.4-.2.87-.16 1.23.09l14.16 10.09a1.156 1.156 0 0 1 0 1.89L15.85 31.6c-.2.14-.44.22-.69.22" style="fill:#f9f9f9"></path><path id="Path_4269" data-name="Path 4269" d="M13.98 20.5v10.23a1.182 1.182 0 0 0 1.87.96l14.16-10.23c.31-.22.49-.58.49-.96H13.98Z" style="fill:#e2dff4"></path></g></g></svg> </div> </div> <a class="MDRIntro__ContainerRightBoxCTA" href="tel:1-866-579-2200">EXPERIENCING A BREACH? CALL 1-866-579-2200</a> <a class="MDRIntro__Btn MDRIntro__Btn--Mobile" href="/get-started">GET STARTED</a> </div> </div> </div> </section> <div class="MultiVideo__VideoModal" data-modal-id="video-a4yo6b4wjp"> <!-- Modal content --> <div class="MultiVideo__VideoModal-content"> <span class="MultiVideo__VideoModal-close" data-modal-video="video-a4yo6b4wjp" data-modal-video-id="a4yo6b4wjp">×</span> <div class="VideoCards__VideoModal-frameContainer"> <script src="//fast.wistia.com/embed/medias/a4yo6b4wjp.jsonp" async></script> <div class="wistia_embed wistia_async_a4yo6b4wjp"> </div> </div> </div> </div> <section class="DataBreach"> <div class="DataBreach__Content"> <div class="DataBreach__ContentTop"> <div class="DataBreach__ContentTopLeft"> <div class="DataBreach__ContentTopLeftFixed"> <h2>When a Data Breach Occurs, You Want Us In Your Corner.</h2> <h3>Respond to any security incident with the world's fastest threat suppression.</h3> </div> </div> <div class="DataBreach__ContentTopRight"> <div class="DataBreach__ContentTopRightBox"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 52.399 41.099"><defs><style>.cls-24remSLA1{fill:#19234d}.cls-24remSLA2{fill:#40c3d9}</style></defs><path d="M20.599 40.899h-2.1c-11.3-1.1-19.5-11.2-18.4-22.4 1.1-11.3 11.2-19.5 22.4-18.4 7.9.8 14.5 5.9 17.2 13.3.2.5 0 1.1-.6 1.3-.5.2-1.1 0-1.3-.6-2.5-6.7-8.4-11.3-15.6-12-10.1-1-19.2 6.4-20.2 16.6s6.4 19.2 16.6 20.2c2.9.3 5.8 0 8.5-1.1.5-.2 1.1 0 1.3.6.2.5 0 1.1-.6 1.3-2.4.9-4.8 1.4-7.3 1.4l.1-.2Z" class="cls-24remSLA1"/><path d="m39.099 14.699-8.4-.8c-.5 0-1-.5-.9-1.1s.5-1 1.1-.9l7.4.7.7-7.4c0-.5.6-1 1.1-.9.5 0 1 .5.9 1.1l-.8 8.4c0 .3-.2.5-.4.7-.2.1-.4.2-.6.2h-.1Z" class="cls-24remSLA1"/><path d="M20.799 20.499c-.6 0-1-.4-1-1v-11.9c0-.6.4-1 1-1s1 .4 1 1v11.9c0 .6-.4 1-1 1ZM19.099 22.199h-7.6c-.6 0-1-.4-1-1s.4-1 1-1h7.6c.6 0 1 .4 1 1s-.4 1-1 1Z" class="cls-24remSLA2"/><path d="M20.799 23.899c-1.5 0-2.7-1.2-2.7-2.7s1.2-2.7 2.7-2.7 2.7 1.2 2.7 2.7-1.2 2.7-2.7 2.7Zm0-3.4c-.4 0-.7.3-.7.7s.3.7.7.7.7-.3.7-.7-.3-.7-.7-.7ZM38.099 34.999c-.6 0-1-.4-1-1v-2h-4.9c-.4 0-.7-.2-.9-.5s-.2-.7 0-1l5.9-8.9c.2-.4.7-.5 1.1-.4.4 0 .7.5.7 1v11.9c0 .6-.4 1-1 1h.1v-.1Zm-4.1-5h3.1v-4.6l-3.1 4.6ZM44.299 34.999c-.6 0-1-.4-1-1v-11.9c0-.6.4-1 1-1s1 .4 1 1v11.9c0 .6-.4 1-1 1Z" class="cls-24remSLA2"/><path d="M51.399 28.999h-7.1c-.6 0-1-.4-1-1s.4-1 1-1h7.1c.6 0 1 .4 1 1s-.4 1-1 1Z" class="cls-24remSLA2"/><path d="M51.399 34.999c-.6 0-1-.4-1-1v-11.9c0-.6.4-1 1-1s1 .4 1 1v11.9c0 .6-.4 1-1 1Z" class="cls-24remSLA2"/></svg> <p>Guaranteed <strong>4-hour</strong> threat suppression promise</p> </div> <div class="DataBreach__ContentTopRightBox"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 42 42"><defs><style>.cls-CSI252{fill:#40c3d9}</style></defs><g id="Layer_1"><path d="M21 42C9.4 42 0 32.6 0 21S9.4 0 21 0s21 9.4 21 21-9.4 21-21 21Zm0-40C10.5 2 2 10.5 2 21s8.5 19 19 19 19-8.5 19-19S31.5 2 21 2Z" style="fill:#19234d"/><path d="M16.2 19c-.6 0-1-.4-1-1v-5.4c0-.6.4-1 1-1s1 .4 1 1V18c0 .6-.5 1-1 1ZM25.8 11.6c.6 0 1 .4 1 1V18c0 .6-.4 1-1 1s-1-.4-1-1v-5.4c0-.6.4-1 1-1Z" class="cls-CSI252"/><path d="M16.2 13.6H16c-.5 0-.9-.6-.8-1.2.4-2.6 3.3-4.4 5.7-4.4 2.4 0 5.3 1.8 5.8 4.4 0 .5-.3 1.1-.8 1.2-.6 0-1.1-.3-1.2-.8-.3-1.6-2.2-2.7-3.7-2.8-1.8 0-3.6 1.3-3.8 2.8 0 .5-.5.8-1 .8ZM24.2 24.4c-.2 0-.4 0-.6-.2-.4-.3-.5-1-.2-1.4 1.6-2 1.4-4.7 1.4-4.7 0-.5.4-1 .9-1.1.6 0 1 .4 1.1.9 0 .1.2 3.5-1.8 6.1-.2.3-.5.4-.8.4ZM17.8 24.4c-.3 0-.6-.1-.8-.4-2-2.6-1.8-6-1.8-6.1 0-.6.5-1 1.1-.9.5 0 1 .5.9 1.1s-.2 2.7 1.4 4.7c.3.4.3 1.1-.2 1.4-.2.1-.4.2-.6.2Z" class="cls-CSI252"/><path d="M31.8 28h-.4l-7.6-3.6c-.5-.2-.7-.8-.5-1.3.2-.5.8-.7 1.3-.5l7.6 3.6c.5.2.7.8.5 1.3-.2.4-.5.6-.9.6ZM10.2 28c-.4 0-.7-.2-.9-.6-.2-.5 0-1.1.5-1.3l7.6-3.6c.5-.2 1.1 0 1.3.5.2.5 0 1.1-.5 1.3l-7.6 3.6h-.4Z" class="cls-CSI252"/><path d="M30.7 31.6H11.3c-1.2 0-2.2-1-2.2-2.2V27c0-.6.4-1 1-1s1 .4 1 1v2.4s0 .2.2.2h19.3s.2 0 .2-.2V27c0-.6.4-1 1-1s1 .4 1 1v2.4c0 1.2-1 2.2-2.2 2.2Z" class="cls-CSI252"/></g></svg> <p>Our Cyber Security Investigations (CSI) Team has been engaged for Incident Response by companies spanning <strong>25+ Industries</strong></p> </div> <div class="DataBreach__ContentTopRightBox"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 42 42"><defs><style>.cls-InsurFi2{fill:#40c3d9}</style></defs><g id="Layer_1"><path d="M21 42C9.4 42 0 32.6 0 21S9.4 0 21 0s21 9.4 21 21-9.4 21-21 21Zm0-40C10.5 2 2 10.5 2 21s8.5 19 19 19 19-8.5 19-19S31.5 2 21 2Z" style="fill:#19234d"/><g id="Layer_1-2"><g id="Group_1821"><path d="M21 12c-.6 0-1-.4-1-1V9c0-.6.4-1 1-1s1 .4 1 1v2c0 .6-.4 1-1 1ZM17.8 34c-2.3 0-4-1.7-4-4.1s.4-1 1-1 1 .4 1 1c0 1.2.8 2.1 2 2.1s2.1-1 2.1-2.1v-8.6c0-.6.4-1 1-1s1 .4 1 1v8.6c0 2.3-1.9 4.1-4.1 4.1Z" class="cls-InsurFi2"/><path d="M9.8 21.7c-1 0-1.8-.9-1.8-1.8 0-6.2 6.5-9.5 13-9.5s13 3.2 13 9.4c0 1-.8 1.8-1.7 1.9H9.8ZM33 19.8Zm-12-7.4c-4.4 0-10.9 1.9-11 7.3h22c0-5.4-6.6-7.3-11-7.3Z" class="cls-InsurFi2"/></g></g></g></svg> <p>We are a preferred Incident Response Provider for <strong>10+ Insurance Firms</strong> </p> </div> <div class="DataBreach__ContentTopRightBox"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 42 42"><defs><style>.cls-CSI121{fill:#19234d}.cls-CSI122{fill:#40c3d9}</style></defs><g id="Layer_1"><path d="M31.4 35.9H20.7c-.4 0-.7-.2-.9-.6l-.8-1.5-4-.9c-1.2-.3-2.1-1.3-2.3-2.5l-.7-5.7-2.3-.8c-.5-.2-.8-.7-.6-1.3l1.9-5.8c.2-.5.7-.8 1.3-.6.5.2.8.7.6 1.3l-1.6 4.8 2 .7c.4.1.6.4.7.8l.8 6.3c0 .4.4.7.8.8l4.5 1c.3 0 .5.3.7.5l.7 1.4h8.8L28.6 25c0-.4 0-.7.3-1 0 0 2.6-2.3 3.3-6.3 0-.5.6-.9 1.2-.8.5 0 .9.6.8 1.2-.7 3.7-2.7 6.1-3.6 7.1l1.8 9.4c0 .3 0 .6-.2.8-.2.2-.5.4-.8.4Z" class="cls-CSI121"/><path d="M12 18.2c-.6 0-1-.4-1-1v-1.6c0-6.2 5.5-11.5 12-11.5h.8c.6 0 1 .5.9 1.1s-.5 1-1.1.9h-.7c-5.4 0-10 4.3-10 9.5v1.6c0 .6-.4 1-1 1ZM24.5 40.4H13.8c-.4 0-.7-.2-.9-.6l-.8-1.5-4-.9c-1.2-.3-2.1-1.3-2.3-2.5l-.7-5.7-2.3-.8c-.5-.2-.8-.7-.6-1.3l1.9-5.8c.2-.5.7-.8 1.3-.6.5.2.8.7.6 1.3l-1.6 4.8 2 .7c.4.1.6.4.7.8l.8 6.3c0 .4.4.7.8.8l4.5 1c.3 0 .5.3.7.5l.7 1.4h10.1c.6 0 1 .4 1 1s-.4 1-1 1Z" class="cls-CSI121"/><path d="M5.1 22.8c-.6 0-1-.4-1-1v-1.6c0-3.2 1.5-6.3 4-8.5.4-.4 1.1-.3 1.4.1.4.4.3 1.1-.1 1.4-2.1 1.8-3.3 4.4-3.3 7v1.6c0 .6-.4 1-1 1Z" class="cls-CSI121"/><path d="M34.5 13.2c-.2 0-.5 0-.7-.2l-1.6-1.1-1.6 1.1c-.4.3-.9.3-1.3 0s-.5-.7-.4-1.2l.5-1.7-1.3-1.3c-.3-.3-.4-.8-.3-1.2s.5-.7 1-.7l1.6-.2.7-1.5c.2-.4.6-.7 1-.7s.8.3 1 .7l.7 1.5 1.6.2c.4 0 .8.3 1 .7.1.4 0 .8-.3 1.2l-1.3 1.3.5 1.7c.1.5 0 .9-.4 1.2-.2.1-.4.2-.6.2Zm-1.9-1.5Zm-1.6-3 .2.2c.3.3.4.7.4 1 .4-.2.9-.2 1.3 0 0-.4.1-.8.4-1l.2-.2h-.1c-.5 0-.9-.4-1.1-.8-.2.4-.7.7-1.1.8h-.1Zm-1.4 1Zm5.3 0Zm-5.2-2.3Zm4.4-.3ZM31.4 6Zm1.7 0Z" class="cls-CSI122"/><path d="M32.3 16.7c-4.2 0-7.6-3.4-7.6-7.6s3.4-7.6 7.6-7.6 7.6 3.4 7.6 7.6-3.4 7.6-7.6 7.6Zm0-13.1c-3.1 0-5.6 2.5-5.6 5.6s2.5 5.6 5.6 5.6 5.6-2.5 5.6-5.6-2.5-5.6-5.6-5.6Z" class="cls-CSI122"/></g></svg> <p>Members of the eSentire Cyber Security Investigations (CSI) Team have an average of <strong>12 years of experience</strong></p> </div> <div class="DataBreach__ContentTopRightBox"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 48.8 50"><defs><style>.cls-25diffway1{fill:#19234d}.cls-25diffway2{fill:#40c3d9}</style></defs><g id="Layer_1"><path d="M30.6 18.5c-.6 0-1-.4-1-1 0-.9-.3-2.1-1-3.8-.2-.5 0-1.1.5-1.3.5-.2 1.1 0 1.3.5.9 2 1.2 3.4 1.2 4.6s-.4 1-1 1ZM28 11.6c-.3 0-.6-.1-.8-.4-2.3-3.2-6-5.1-10-5.1s-4.1.5-5.8 1.3c-.5.2-1.1 0-1.3-.4-.2-.5 0-1.1.4-1.3 2-1 4.4-1.6 6.7-1.6 4.6 0 8.9 2.2 11.6 5.9.3.4.2 1.1-.2 1.4-.2.1-.4.2-.6.2ZM4.1 33.3h-.3c-.5-.2-.8-.7-.6-1.3 1.8-5.5 1.5-8.7 1.4-11.2v-2.2c0-5.4.5-8.2 3.2-11 .4-.4 1-.4 1.4 0 .4.4.4 1 0 1.4-2.1 2.1-2.6 4-2.6 9.5v2c.2 2.7.4 6.2-1.5 12-.1.4-.5.7-1 .7Z" class="cls-25diffway2"/><path d="M26.1 17.7c-.4 0-.8-.3-1-.7-.4-1.5-2.2-6.3-7.6-6.4-.6 0-1-.5-1-1 0-.6.5-1 1-1 4.6.1 8.1 3.1 9.5 7.9.2.5-.2 1.1-.7 1.2H26ZM9.6 22.1c-.4 0-.8-.3-1-.7 0-.1-.2-.8-.3-2.7-.2-5.3 1.6-8.3 5.8-9.7.5-.2 1.1.1 1.3.6.2.5-.1 1.1-.6 1.3-2.8.9-4.7 2.6-4.5 7.7 0 1.7.2 2.3.2 2.3.1.5-.2 1.1-.7 1.2h-.3ZM7.7 36.3h-.4c-.5-.2-.8-.8-.6-1.3 1.2-3.2 1.6-5.2 1.7-5.9.4-2.8.4-4.8.4-4.8 0-.6.4-1 1-1s1 .4 1 1c0 0 0 2.1-.4 5.1-.1.8-.5 3-1.8 6.4-.2.4-.5.6-.9.6ZM22.1 19.7c-.4 0-.8-.3-.9-.7-.3-.9-.8-2-1.2-2.5-.4-.4-.3-1.1.1-1.4.4-.4 1.1-.3 1.4.1.7.9 1.3 2.4 1.6 3.2.2.5-.1 1.1-.6 1.3h-.3Z" class="cls-25diffway2"/><path d="M11.7 37.3h-.4c-.5-.2-.8-.8-.5-1.3.7-1.6 2.3-5.4 2.3-9.2s-.2-3.9-.4-4.8c-.2-.8-.3-1.5-.3-3.2 0-3.4 1.9-5.6 4.8-5.6s.9 0 1.4.3c.5.3.7.9.4 1.3-.3.5-.9.7-1.3.4h-.4c-2.4 0-2.8 2.3-2.8 3.6s.1 2.1.3 2.8c.2 1 .4 2 .4 5.1s-1.7 8.3-2.4 10c-.2.4-.5.6-.9.6Z" class="cls-25diffway2"/><path d="M18.5 23.3c-.6 0-1-.4-1-1 0-2-.7-3.1-.8-3.1-.3-.4-.2-1.1.2-1.4.4-.3 1.1-.2 1.4.2.1.2 1.2 1.6 1.2 4.3s-.4 1-1 1ZM16.2 38h-.4c-.5-.2-.8-.8-.5-1.3 0 0 1-2.5 1.6-4.3.2-.5.7-.8 1.3-.6.5.2.8.7.6 1.3-.6 1.8-1.6 4.3-1.7 4.4-.2.4-.5.6-.9.6ZM34.6 20.5c-.6 0-1-.4-1-1 0-4.3-1-10.2-5.6-13.6-.4-.3-.5-1-.2-1.4.3-.4 1-.5 1.4-.2 4.2 3.1 6.4 8.4 6.4 15.3s-.4 1-1 1ZM1.6 14.8h-.1c-.5 0-.9-.6-.9-1.1.2-1.8.6-3.3 1.2-4.6C4.5 3.1 9.7 0 17.2 0s6.8.8 9.6 2.4c.5.3.6.9.4 1.4-.3.5-.9.6-1.4.4C23.4 2.8 20.5 2 17.3 2 10.7 2 6 4.7 3.6 9.9c-.5 1-.8 2.4-1 4 0 .5-.5.9-1 .9ZM1 29H.8c-.5-.1-.9-.6-.8-1.2.5-2.4.6-4.5.5-6.7-.1-1.6-.1-3-.1-4.3 0-.6.4-1 1-1s1 .5 1 1c0 1.2 0 2.6.1 4.1.2 2.4 0 4.7-.5 7.2 0 .5-.5.8-1 .8Z" class="cls-25diffway2"/><path d="M36.8 39c-.3 0-.5 0-.7-.3L34.4 37c-.4-.4-.4-1 0-1.4s1-.4 1.4 0l1.7 1.7c.4.4.4 1 0 1.4-.2.2-.5.3-.7.3Z" class="cls-25diffway1"/><path d="M45.2 50c-1 0-1.9-.4-2.6-1.1l-6.2-6.2c-.7-.7-1.1-1.6-1.1-2.6s.4-1.9 1.1-2.6c1.4-1.4 3.8-1.4 5.2 0l6.2 6.2c.7.7 1.1 1.6 1.1 2.6s-.4 1.9-1.1 2.6c-.7.7-1.6 1.1-2.6 1.1ZM44 47.5c.6.6 1.7.6 2.3 0 .3-.3.5-.7.5-1.2s-.2-.9-.5-1.2l-6.2-6.2c-.6-.6-1.7-.6-2.3 0-.3.3-.5.7-.5 1.2s.2.9.5 1.2l6.2 6.2Z" class="cls-25diffway1"/><path d="M27.7 39.8c-6.5 0-11.8-5.3-11.8-11.8s5.3-11.8 11.8-11.8S39.5 21.5 39.5 28s-5.3 11.8-11.8 11.8Zm0-21.6c-5.4 0-9.8 4.4-9.8 9.8s4.4 9.8 9.8 9.8 9.8-4.4 9.8-9.8-4.4-9.8-9.8-9.8Z" class="cls-25diffway1"/><path d="M27.7 30c-.6 0-1-.4-1-1v-7.3c0-.6.4-1 1-1s1 .4 1 1V29c0 .6-.4 1-1 1ZM27.7 34.7c-.9 0-1.6-.7-1.6-1.6s.7-1.6 1.6-1.6 1.6.7 1.6 1.6-.7 1.6-1.6 1.6Zm0-2c-.2 0-.4.2-.4.4s.2.4.4.4.4-.2.4-.4-.2-.4-.4-.4Z" class="cls-25diffway2"/></g></svg> <p>eSentire's digital forensic technology can be deployed in <strong>25+ different ways</strong> and works across almost any environment</p> </div> </div> </div> <div class="DataBreach__ContentBottom"> <p>When disaster strikes, you need an incident response partner that can react with industry-leading speed and efficacy. Having immediate access to expert on-demand digital forensics and incident response services brings rapid control and stability to your organization when a breach occurs. How fast your organization contains and recovers from a security incident is critical to limiting business disruption, reducing costs, and recovering from reputational damage.</p> <p>eSentire’s On-Demand 24/7 Incident Response service guarantees that you’re prepared for the most advanced attacks. Through a combination of best-in-class digital forensics technology and the expertise of our elite incident responders, we provide the fastest threat suppression in the industry, suppressing any incident, anywhere in the world, within 4 hours.</p> <p>Our proprietary digital forensics tool, eSentire Agent enables rapid response so you can contain cyber threats and get back to normal business operations. Once our partnership begins, eSentire agents are deployed across your environment, giving our team instant access, detection and containment capabilities, delivering unmatched time-to-value.</p> </div> <div class="DataBreach__ContentBottomBox"> <h3>eSentire Digital Forensics and Incident Response Protects Against:</h3> <div class="DataBreach__ContentBottomBoxIconRow"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 52 41.369"><defs><style>.clsRansomwareData-1{fill:#19234d}.clsRansomwareData-2{fill:#696de3}</style></defs><path d="M49 34.669H9.5c-1.7 0-3-1.3-3-3v-28.6c0-1.7 1.3-3 3-3h13c.6 0 1 .4 1 1s-.4 1-1 1h-13c-.6 0-1 .4-1 1v28.6c0 .6.4 1 1 1H49c.6 0 1-.4 1-1v-24.3c0-.6-.4-1-1-1H29.3c-.6 0-1-.4-1-1s.4-1 1-1H49c1.7 0 3 1.3 3 3v24.3c0 1.7-1.3 3-3 3Z" class="clsRansomwareData-1"/><path d="M42.5 41.269H3c-1.7 0-3-1.3-3-3v-28.6c0-1.7.9-3 2.1-3h1.1c.6 0 1 .4 1 1s-.4 1-1 1h-.9c0 .1-.2.5-.2 1v28.6c0 .6.4 1 1 1h39.5c.5 0 .9-.1 1-.2v-.9c0-.6.4-1 1-1s1 .4 1 1v1.1c0 1.2-1.3 2.1-3 2.1l-.1-.1ZM29.3 6.469c-.2 0-.4 0-.5-.2l-6.7-4.4c-.5-.3-.6-.9-.3-1.4s.9-.6 1.4-.3l6.7 4.4c.5.3.6.9.3 1.4-.2.3-.5.5-.8.5h-.1Z" class="clsRansomwareData-1"/><path d="M29.5 24.769H28c-.3 0-.7-.2-.9-.5s-.2-.7 0-1l.8-1.5c.2-.3.5-.6.9-.6s.7.2.9.6l.8 1.5c.2.3.1.7 0 1-.2.3-.5.5-.8.5h-.2Z" class="clsRansomwareData-2"/><path d="M33.4 29.069h-9.3c-.5 0-.9-.4-1-.9l-.4-3.5c0-.5.3-1 .9-1.1.6 0 1 .3 1.1.9l.3 2.6h7.5l.3-2.6c0-.5.6-.9 1.1-.9s.9.6.9 1.1l-.4 3.5c0 .5-.5.9-1 .9Z" class="clsRansomwareData-2"/><path d="M26.4 28.669c-.6 0-1-.4-1-1v-1.5c0-.6.4-1 1-1s1 .4 1 1v1.5c0 .6-.4 1-1 1ZM28.7 28.669c-.6 0-1-.4-1-1v-1.5c0-.6.4-1 1-1s1 .4 1 1v1.5c0 .6-.4 1-1 1ZM31.1 28.669c-.6 0-1-.4-1-1v-1.5c0-.6.4-1 1-1s1 .4 1 1v1.5c0 .6-.4 1-1 1Z" class="clsRansomwareData-2"/><path d="M33.8 25.569c-.5 0-.9-.3-1-.8s.2-1.1.8-1.2c.4 0 1.5-.5 1.8-1.2 0 0 .5-1.3.5-3.2 0-3.9-2.2-7.9-7.2-7.9s-7.1 4-7.1 7.9.5 3.2.5 3.2c.3.8 1.4 1.2 1.8 1.3.5.1.9.7.8 1.2-.1.5-.6.9-1.2.8-.3 0-2.5-.6-3.2-2.5 0 0-.6-1.6-.6-3.9 0-4.8 2.9-9.9 9.1-9.9s9.2 5.1 9.2 9.9-.6 3.9-.7 3.9c-.7 1.9-3 2.4-3.2 2.5h-.2l-.1-.1Z" class="clsRansomwareData-2"/><path d="M24.8 22.869c-1.8 0-3.3-1.3-3.3-2.9s1.5-2.9 3.3-2.9 3.3 1.3 3.3 2.9-1.5 2.9-3.3 2.9Zm0-3.9c-.7 0-1.3.4-1.3.9s.6.9 1.3.9 1.3-.4 1.3-.9-.6-.9-1.3-.9ZM32.6 22.869c-1.8 0-3.3-1.3-3.3-2.9s1.5-2.9 3.3-2.9 3.3 1.3 3.3 2.9-1.5 2.9-3.3 2.9Zm0-3.9c-.7 0-1.3.4-1.3.9s.6.9 1.3.9 1.3-.4 1.3-.9-.6-.9-1.3-.9Z" class="clsRansomwareData-2"/></svg> <p>Ransomware and Data Extortion</p> </div> <div class="DataBreach__ContentBottomBoxIconRow"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 51.005 50.825"><defs><style>.clsBusEmail-1{fill:#19234d}.clsBusEmail-2{fill:#696de3}</style></defs><path d="M30.305 46.512h-27.3c-1.7 0-3-1.3-3-3v-24.2c0-.6.4-1 1-1s1 .4 1 1v24.2c0 .6.4 1 1 1h27.3c.6 0 1 .4 1 1s-.4 1-1 1ZM44.505 30.212c-.6 0-1-.4-1-1v-9.8c0-.6.4-1 1-1s1 .4 1 1v9.8c0 .6-.4 1-1 1Z" class="clsBusEmail-1"/><path d="M2.705 44.712c-.3 0-.6-.1-.8-.3-.4-.4-.3-1 .1-1.4l18.7-16.2c1.1-.9 2.8-.9 3.9 0l7.5 7.2c.4.4.4 1 0 1.4s-1 .4-1.4 0l-7.5-7.2c-.3-.2-.9-.2-1.2 0l-18.7 16.201c-.2.2-.4.2-.7.2l.1.1ZM44.505 20.413c-.2 0-.5 0-.6-.2l-21.2-17.901-21 17.8c-.4.4-1.1.3-1.4-.1-.4-.4-.3-1.1.1-1.4l21.7-18.3c.4-.3.9-.3 1.3 0l21.8 18.5c.4.4.5 1 .1 1.4-.2.2-.5.4-.8.4v-.2Z" class="clsBusEmail-1"/><path d="M13.005 35.613c-.3 0-.6-.1-.8-.4l-12-15.401c-.3-.4-.3-1.1.2-1.4.4-.3 1.1-.3 1.4.2l12 15.4c.3.4.3 1.1-.2 1.4-.2.1-.4.2-.6.2ZM31.405 35.613c-.2 0-.5 0-.7-.2-.4-.4-.5-1-.1-1.4l13-15.2c.4-.4 1-.5 1.4-.1s.5 1 .1 1.4l-13 15.2c-.2.2-.5.3-.8.3h.1Z" class="clsBusEmail-1"/><path d="M47.305 48.113c-.3 0-.5 0-.7-.3l-9.8-9.8c-.4-.4-.4-1 0-1.4s1-.4 1.4 0l9.8 9.8c.4.4.4 1 0 1.4-.2.2-.5.3-.7.3Z" class="clsBusEmail-2"/><path d="M42.405 50.913c-4.7 0-8.6-3.9-8.6-8.6s3.9-8.6 8.6-8.6 8.6 3.9 8.6 8.6-3.9 8.6-8.6 8.6Zm0-15.3c-3.6 0-6.6 3-6.6 6.6s3 6.6 6.6 6.6 6.6-3 6.6-6.6-3-6.6-6.6-6.6Z" class="clsBusEmail-2"/></svg> <p>Business Email Compromise</p> </div> <div class="DataBreach__ContentBottomBoxIconRow"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 51.2 54.9"><defs><style>.clsDataBreach-1{fill:#19234d}</style></defs><path d="M1 30.7c-.3 0-.5 0-.7-.3-.4-.4-.4-1 0-1.4l3.4-3.4c.4-.4 1-.4 1.4 0L8.5 29c.4.4.4 1 0 1.4s-1 .4-1.4 0l-2.7-2.7-2.7 2.7c-.2.2-.5.3-.7.3ZM46.8 23.8c-.3 0-.5 0-.7-.3l-3.4-3.4c-.4-.4-.4-1 0-1.4s1-.4 1.4 0l2.7 2.7 2.7-2.7c.4-.4 1-.4 1.4 0s.4 1 0 1.4l-3.4 3.4c-.2.2-.5.3-.7.3ZM25 54.7c-.4 0-.8-.3-.9-.7-.2-.5 0-1.1.6-1.3 13.2-4.6 18.2-15.9 20.1-24.5.1-.5.7-.9 1.2-.8.5.1.9.7.8 1.2-2 9.1-7.3 21-21.4 25.9h-.3l-.1.2Z" class="clsDataBreach-1"/><path d="M46.8 21.4c-.6 0-1-.4-1-1V9.8c0-.4-.4-.8-.8-.8h-3.5c-.6 0-1-.4-1-1s.4-1 1-1H45c1.5 0 2.8 1.3 2.8 2.8v10.6c0 .6-.4 1-1 1ZM25 54.7h-.3c-14-4.9-19.4-16.8-21.4-25.9-.1-.5.2-1.1.8-1.2.5-.1 1.1.2 1.2.8 1.9 8.6 6.9 19.8 20.1 24.5.5.2.8.8.6 1.3-.1.4-.5.7-.9.7l-.1-.2ZM3.3 21.4c-.6 0-1-.4-1-1V9.8C2.3 8.3 3.6 7 5.1 7h3.5c.6 0 1 .4 1 1s-.4 1-1 1H5.1c-.4 0-.8.4-.8.8v10.6c0 .6-.4 1-1 1Z" class="clsDataBreach-1"/><path d="M41.4 8.9c-9.6 0-14.6-4.3-16.4-6.3-1.8 2-6.7 6.3-16.4 6.3s-1-.4-1-1 .4-1 1-1C19.7 6.9 23.9.7 24.1.5c.2-.3.5-.5.8-.5h.1c.3 0 .7.2.8.5.2.3 4.3 6.4 15.5 6.4s1 .4 1 1-.4 1-1 1h.1Z" class="clsDataBreach-1"/><path d="M20.6 39.8c-.2 0-.3 0-.5-.1-.4-.2-.6-.7-.5-1.2l2.6-8.7h-3.7c-.3 0-.6-.2-.8-.4s-.2-.6 0-.9l5-12c.2-.4.5-.6.9-.6h9c.4 0 .7.2.9.6.2.3.1.7 0 1l-4.8 6.4h3c.4 0 .7.2.9.6s.1.8-.1 1.1l-11 14c-.2.2-.5.4-.8.4l-.1-.2Zm-.5-12h3.5c.3 0 .6.1.8.4.2.3.2.6.2.9L23.1 34l6.5-8.2h-2.9c-.4 0-.7-.2-.9-.6-.2-.3-.1-.7 0-1l4.8-6.4h-6.3l-4.2 10Z" style="fill:#696de3"/></svg> <p>Data Breach Response</p> </div> <div class="DataBreach__ContentBottomBoxIconRow"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 48.978 55"><defs><style>.clsActiveThreat-1{fill:#19234d}.clsActiveThreat-2{fill:#696de3}</style></defs><path d="M7.939 52.2c-.3 0-.6-.1-.8-.4l-6.9-9.1c-.2-.4-.3-.9-.2-1.3l3.4-11.7c.1-.5.5-.9.9-1.1l7-3.2c-.2-.5-.4-.9-.5-1.1-1.5-4-1.6-4.2-1.8-6.5v-1.3c0-.2 1.1-4.9 9.1-13.6 1.6-1.8 4-2.9 6.4-2.9s4.8 1 6.4 2.9c8 8.8 9 13.6 9.1 13.8v.6l-.2 1.1c0 .3 0 .5-.1.7v.4c-.3 1.5-.4 2.5-1.6 5.5 0 0-.1.2-.2.5l6.7 3.1c.4.2.8.6.9 1l3.4 11.8c.1.4 0 1-.2 1.4l-7.2 9.1c-.3.4-1 .5-1.4.2s-.5-1-.2-1.4l7-8.8-3.3-11.4-6.5-3v.1l-.5 1.2c-.2.5-.8.7-1.3.5s-.7-.8-.5-1.3c.1-.3 1.5-3.3 1.6-3.6 1.1-2.8 1.2-3.6 1.4-5.1V19c0-.2.1-.5.2-.7l.2-1c-.2-.6-1.6-5-8.6-12.8-1.3-1.4-3.1-2.2-4.9-2.2s-3.7.8-4.9 2.2c-6.9 7.7-8.4 12-8.6 12.7v.6q.2 2.1 1.7 6c.2.4 1.5 3.3 1.8 3.9.1.2.1.5 0 .8 0 .3-.3.5-.5.6-.6.3-.9.1-1.3-.5s-.1-.3-.3-.5c0-.2-.2-.3-.3-.5v-.1l-6.9 3.2-3.3 11.4 6.8 8.9c.3.4.2 1.1-.2 1.4-.2.1-.4.2-.6.2l-.2-.4Zm39.1-10.3Zm-3.3-11.6Zm-38.6 0Zm.2-.2Zm5.6-13Zm0-.3Z" class="clsActiveThreat-1"/><path d="M24.439 29.3c-.2 0-.3 0-.5-.1-2.2-1.2-4-2.9-5.3-5-1.4-2.2-2.1-4.8-2.1-7.4v-2c0-.4.2-.8.6-.9l7-3c.3-.1.5-.1.8 0l6.8 3c.4.2.6.5.6.9v2c0 5.2-2.8 10-7.4 12.4-.1 0-.3.1-.5.1Zm-5.9-13.9v1.3c0 2.2.6 4.4 1.8 6.3 1 1.7 2.4 3 4.1 4 3.7-2.2 5.9-6.1 5.9-10.4v-1.4l-5.8-2.6-6 2.6v.2Z" class="clsActiveThreat-1"/><path d="M40.639 55h-32.7c-.6 0-1-.4-1-1v-3.7c0-.6.4-1 1-1h32.8c.6 0 1 .4 1 1V54c0 .6-.4 1-1 1h-.1Zm-31.7-2h30.8v-1.7h-30.8V53Z" class="clsActiveThreat-2"/><path d="M40.639 51.3h-32.7c-.6 0-1-.4-1-1V34.2c0-.6.4-1 1-1h32.8c.6 0 1 .4 1 1v16.1c0 .6-.4 1-1 1h-.1Zm-31.7-2h30.8V35.2h-30.8v14.1Z" class="clsActiveThreat-2"/></svg> <p>Active Threat Actors & Compromised Domain Controllers</p> </div> </div> </div> </section> <section class="ThreatSuppression"> <div class="ThreatSuppression__Content"> <h2>eSentire's Industry Leading 4-Hour Threat Suppression</h2> <div class="ThreatSuppression__ContentImages"> <img src="https://esentire-dot-com-assets.s3.amazonaws.com/assetsV4/Common/DFIR/DFIR-diagram-video_2_still.png" alt="eSentire's Industry Leading 4-Hour Threat Suppression Timeline"> <img src="https://esentire-dot-com-assets.s3.amazonaws.com/assetsV4/Common/DFIR/DFIR-diagram-video_2_update.png" alt="eSentire's Industry Leading 4-Hour Threat Suppression Timeline Mobile"> </div> <h3>Response Differences: Threat Suppression vs. Call Back</h3> <div class="ThreatSuppression__TipContainer"> <div class="ThreatSuppression__TipContainerLeft"> <div class="ThreatSuppression__TipContainerLeftIconTop"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 21 21"><defs><style>.clsDfirTip-1{fill:#19234d}.clsDfirTip-2{fill:#40c3d9}</style></defs><g id="Layer_1"><path d="M7.9 15.5c-.3 0-.5-.2-.5-.5 0-.2 0-.8-.4-1.1-.2-.2-.2-.5 0-.7.2-.2.5-.2.7 0 .7.6.7 1.7.7 1.8 0 .3-.2.5-.5.5ZM13.1 15.5c-.3 0-.5-.2-.5-.5s0-1.2.7-1.8c.2-.2.5-.2.7 0 .2.2.2.5 0 .7-.3.3-.4.9-.4 1.1 0 .3-.2.5-.5.5Z" class="clsDfirTip-1"/><path d="M17.9 2.7c-.1 0-.3 0-.4-.1-.2-.2-.2-.5 0-.7L19.2.2c.2-.2.5-.2.7 0s.2.5 0 .7l-1.7 1.7s-.2.1-.4.1Z" class="clsDfirTip-2"/><path d="M17.9 2.7c-.1 0-.3 0-.4-.1-.2-.2-.2-.5 0-.7L19.2.2c.2-.2.5-.2.7 0s.2.5 0 .7l-1.7 1.7s-.2.1-.4.1ZM19.6 15.8c-.1 0-.3 0-.4-.1L17.5 14c-.2-.2-.2-.5 0-.7s.5-.2.7 0l1.7 1.7c.2.2.2.5 0 .7s-.2.1-.4.1Z" class="clsDfirTip-2"/><path d="M19.6 15.8c-.1 0-.3 0-.4-.1L17.5 14c-.2-.2-.2-.5 0-.7s.5-.2.7 0l1.7 1.7c.2.2.2.5 0 .7s-.2.1-.4.1ZM20.5 8.4h-1.3c-.3 0-.5-.2-.5-.5s.2-.5.5-.5h1.3c.3 0 .5.2.5.5s-.2.5-.5.5Z" class="clsDfirTip-2"/><path d="M20.5 8.4h-1.3c-.3 0-.5-.2-.5-.5s.2-.5.5-.5h1.3c.3 0 .5.2.5.5s-.2.5-.5.5ZM1.4 15.8c-.1 0-.3 0-.4-.1-.2-.2-.2-.5 0-.7l1.7-1.7c.2-.2.5-.2.7 0s.2.5 0 .7l-1.7 1.7s-.2.1-.4.1Z" class="clsDfirTip-2"/><path d="M1.4 15.8c-.1 0-.3 0-.4-.1-.2-.2-.2-.5 0-.7l1.7-1.7c.2-.2.5-.2.7 0s.2.5 0 .7l-1.7 1.7s-.2.1-.4.1ZM3.1 2.7c-.1 0-.3 0-.4-.1L1 .9C.8.7.8.4 1 .2c.2-.2.5-.2.7 0l1.7 1.7c.2.2.2.5 0 .7s-.2.1-.4.1Z" class="clsDfirTip-2"/><path d="M3.1 2.7c-.1 0-.3 0-.4-.1L1 .9C.8.7.8.4 1 .2c.2-.2.5-.2.7 0l1.7 1.7c.2.2.2.5 0 .7s-.2.1-.4.1ZM1.8 8.4H.5c-.3 0-.5-.2-.5-.5s.2-.5.5-.5h1.3c.3 0 .5.2.5.5s-.2.5-.5.5Z" class="clsDfirTip-2"/><path d="M1.8 8.4H.5c-.3 0-.5-.2-.5-.5s.2-.5.5-.5h1.3c.3 0 .5.2.5.5s-.2.5-.5.5Z" class="clsDfirTip-2"/><path d="M7.4 14c-.1 0-.2 0-.3-.1C5 12.4 4 10.4 4 8.1c0-3.8 3-6.8 6.6-6.8s.5.2.5.5-.2.5-.5.5C7.5 2.3 5 4.9 5 8.1s1.5 4.1 2.7 5c.2.2.3.5.1.7 0 .1-.2.2-.4.2Z" class="clsDfirTip-1"/><path d="M13.6 14c-.2 0-.3 0-.4-.2-.2-.2-.1-.5.1-.7 1.2-.9 2.7-2.6 2.7-5s-2.5-5.8-5.6-5.8-.5-.2-.5-.5.2-.5.5-.5C14 1.3 17 4.4 17 8.1s-1.1 4.3-3.1 5.8c0 0-.2.1-.3.1ZM10.5 21c-2.2 0-3-1.5-3.1-2.3V15c0-.3.2-.5.5-.5s.5.2.5.5v3.6s.3 1.4 2.1 1.4.5.2.5.5-.2.5-.5.5Z" class="clsDfirTip-1"/><path d="M10.5 21c-.3 0-.5-.2-.5-.5s.2-.5.5-.5c1.8 0 2.1-1.4 2.1-1.5V15c0-.3.2-.5.5-.5s.5.2.5.5v3.6c-.1.9-.9 2.4-3.1 2.4Z" class="clsDfirTip-1"/><path d="M10.6 17.1c-1.6 0-2.9-.7-3-.7-.2-.1-.3-.4-.2-.7s.4-.3.7-.2c0 0 2.4 1.3 4.7 0 .2-.1.5 0 .7.2.1.2 0 .5-.2.7-1 .6-1.9.7-2.8.7Z" class="clsDfirTip-1"/><path d="M9.6 10.6c-.2 0-.3 0-.4-.2L7.7 8.2c-.2-.2 0-.5.1-.7.2-.2.5 0 .7.1l1.1 1.7 3.3-3.5c.2-.2.5-.2.7 0 .2.2.2.5 0 .7l-3.7 3.9s-.2.2-.4.2Z" class="clsDfirTip-2"/></g></svg> <h5>TIP</h5> </div> <p>When considering response claims from incident response providers, it is important to understand what “response” really means. Is it a call back or is it a service level agreement that guarantees cybersecurity threats to be resolved within a certain timeframe as a part of incident response?</p> </div> <div class="ThreatSuppression__TipContainerRight"> <p>At eSentire, we get you back to normal operations in a matter of hours with our guaranteed 4-hour threat suppression promise, anywhere in the world. We strategically pre-deploy the eSentire agent so our team has immediate access to suppress any threat.</p> </div> </div> </div> </section> <section class="YouExpectServices YouExpectServices__DFIR"> <div class="YouExpectServices__Content"> <h2>What You Can Expect</h2> <div class="YouExpectServices__Tabs"> <div class="YouExpectServices__TabsLeft"> <div class="YouExpectServices__TabCell selected" data-tab-id="1"><h3>Industry-Leading 4-Hour Threat Suppression</h3></div> <div class="YouExpectServices__TabCell" data-tab-id="2"><h3>Elite Global Expertise, On-Demand</h3></div> <div class="YouExpectServices__TabCell" data-tab-id="3"><h3>Breakthrough Digital Forensics Technology</h3></div> <div class="YouExpectServices__TabCell" data-tab-id="4"><h3>Full Support from Response to Recovery</h3></div> </div> <div class="YouExpectServices__TabsRight"> <div class="YouExpectServices__TabCopy selected" data-tab="1"> <h4 class="eyebrow">OUR DIFFERENCE</h4> <h3>Industry-Leading 4-Hour Threat Suppression</h3> <h4 class="eyebrow">YOUR RESULTS</h4> <p>Get back to normal operations in a matter of hours with our guaranteed 4-hour threat suppression promise, anywhere in the world. </p> <p>Our strategically deployed eSentire agent provides our team with immediate access to suppress any threat.</p> </div> <div class="YouExpectServices__TabCopy" data-tab="2"> <h4 class="eyebrow">OUR DIFFERENCE</h4> <h3>Elite Global Expertise, On-Demand</h3> <h4 class="eyebrow">YOUR RESULTS</h4> <p>Priority access on-demand to our team of elite incident responders. No matter where you are, sleep easy knowing that a team of battle-tested cybersecurity experts with decades of technical leadership experience is standing by your side 24/7.</p> </div> <div class="YouExpectServices__TabCopy" data-tab="3"> <h4 class="eyebrow">OUR DIFFERENCE</h4> <h3>Breakthrough Digital Forensics Technology</h3> <h4 class="eyebrow">YOUR RESULTS</h4> <p>Experience immediate time-to-value and get back to normal business operations within hours (vs. days) through the use of industry-leading digital forensics and investigative tools, powered by the eSentire agent, no matter the size or location of your organization.</p> </div> <div class="YouExpectServices__TabCopy" data-tab="4"> <h4 class="eyebrow">OUR DIFFERENCE</h4> <h3>Full Support from Response to Recovery</h3> <h4 class="eyebrow">YOUR RESULTS</h4> <p>Get smooth recovery with full support through the investigative lifecycle, including the filing of cyber insurance claims, compliance & litigation evidence preservation, transitioning findings to law enforcement, supporting legal proceedings, expert witness testimony, and strengthening security gaps through the implementation of lessons learned.</p> </div> </div> </div> <div class="NotALLEqualMDR__ContentBottom"> <h3>Review Our Digital Forensics and Incident Response FAQ</h3> <a class="NotALLEqualMDR__ContentBottomCta" data-modal-id="FAQPopup">View Now</a> </div> </div> </section> <script> let YouExpectServices = document.querySelectorAll('.YouExpectServices__TabCell'); YouExpectServices.forEach(YouExpectService => { YouExpectService.addEventListener('click', (e) => { document.querySelectorAll('.YouExpectServices__TabCopy').forEach((TabCopy) => { TabCopy.classList.remove('selected'); }); document.querySelectorAll('.YouExpectServices__TabCell').forEach((TabCell) => { TabCell.classList.remove('selected'); }); YouExpectService.classList.add('selected'); document.querySelector(`.YouExpectServices__TabCopy[data-tab="${YouExpectService.getAttribute('data-tab-id')}"]`).classList.add('selected'); }); }); </script> <section class="FAQPopup FAQPopup__DFIR" data-modal-id="FAQPopup"> <div class="FAQPopup__Content"> <div class="FAQPopup__Close" data-modal-id="FAQPopup"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 10 10"><defs><style>.ClostBlack1{fill:#000000}</style></defs><g id="Layer_2-2"><path class="ClostBlack1" d="M5 10c-2.76 0-5-2.24-5-5s2.24-5 5-5 5 2.24 5 5-2.24 5-5 5ZM5 .59C2.57.59.59 2.57.59 5S2.57 9.41 5 9.41 9.41 7.43 9.41 5 7.43.59 5 .59Z"></path><path class="ClostBlack1" d="M6.64 6.93c-.08 0-.15-.03-.21-.09L3.16 3.57c-.11-.11-.11-.3 0-.42s.3-.11.42 0l3.27 3.27c.11.11.11.3 0 .42-.06.06-.13.09-.21.09Z"></path><path class="ClostBlack1" d="M3.36 6.93c-.08 0-.15-.03-.21-.09a.308.308 0 0 1 0-.42l3.27-3.27c.11-.11.3-.11.42 0s.11.3 0 .42L3.57 6.84c-.06.06-.13.09-.21.09Z"></path></g></svg> </div> <div class="FAQPopup__Container"> <h2>Digital Forensics and Incident Response FAQ </h2> <div class="FAQPopup__List"> <div class="FAQPopup__ListItem" data-drawer-id="1"> <div class="FAQPopup__ListItemTop"> <h4>What is Digital Forensics and Incident Response (DFIR)?</h4> <div class="FAQPopup__ListItemTopIcon" data-drawer-id="1"> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M15.99 25.06a1.514 1.514 0 0 1-1.511-1.511V8.45c0-.833.678-1.512 1.511-1.512.834 0 1.512.679 1.512 1.512V23.55a1.51 1.51 0 0 1-1.492 1.512"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> </div> </div> <div class="FAQPopup__ListItemBottom"> <p><a href="/cybersecurity-fundamentals-defined/what-is-dfir">Digital Forensics and Incident Response (DFIR)</a> plays a significant role in an organization’s ability to proactively reduce the impact of a cyberattack. Digital Forensics and Incident Response is a specialization within forensic science that emphasizes acquiring, analyzing, and reporting on digital evidence procured from devices and networks. It also encompasses the process of identifying and addressing security events that disrupt or penetrate network resources. By evaluating the source of the threat disruption and taking prompt action to contain, eliminate, or remediate the impact, DFIR ensures the integrity and security of your digital environment against cyber threats.</p> </div> </div> <div class="FAQPopup__ListItem" data-drawer-id="2"> <div class="FAQPopup__ListItemTop"> <h4>What is the role of Digital Forensics in cybersecurity?</h4> <div class="FAQPopup__ListItemTopIcon" data-drawer-id="2"> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M15.99 25.06a1.514 1.514 0 0 1-1.511-1.511V8.45c0-.833.678-1.512 1.511-1.512.834 0 1.512.679 1.512 1.512V23.55a1.51 1.51 0 0 1-1.492 1.512"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> </div> </div> <div class="FAQPopup__ListItemBottom"> <p><a href="/cybersecurity-fundamentals-defined/glossary/what-is-digital-forensics-df">Digital forensics</a> is a critical aspect of comprehensive incident response services. It focuses on the collection, preservation, and analysis of digital evidence to reconstruct events, pinpoint root causes, and determine the scope of breaches. By thoroughly examining electronic devices, networks, and digital data footprints, experts in digital forensics and incident response can reveal vital information about cyberattacks, data breaches, and security incidents affecting your organization. The tactical use of forensic tools and methodologies helps in addressing an immediate cyber threat and strengthens your cybersecurity posture and your ability to recover from a cyberattack.</p> </div> </div> <div class="FAQPopup__ListItem" data-drawer-id="3"> <div class="FAQPopup__ListItemTop"> <h4>Why is an incident response plan essential for an organization?</h4> <div class="FAQPopup__ListItemTopIcon" data-drawer-id="3"> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M15.99 25.06a1.514 1.514 0 0 1-1.511-1.511V8.45c0-.833.678-1.512 1.511-1.512.834 0 1.512.679 1.512 1.512V23.55a1.51 1.51 0 0 1-1.492 1.512"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> </div> </div> <div class="FAQPopup__ListItemBottom"> <p><a href="/cybersecurity-fundamentals-defined/glossary/what-is-incident-response-ir">Incident response</a> planning is a strategic and proactive measure that involves crafting a comprehensive set of written instructions to determine your organization's reaction to potential cybersecurity threats such as data breaches, data leaks, and cyberattacks. This process includes researching potential cyber risks specific to your organization and understanding how to mitigate and eliminate them within a given timeframe. Your plan should provide explicit directions for cyberattack scenarios, with the primary aim of minimizing damage, reducing the recovery time, and mitigating your overall cybersecurity risk.</p> </div> </div> <div class="FAQPopup__ListItem" data-drawer-id="4"> <div class="FAQPopup__ListItemTop"> <h4>What is the relationship between threat intelligence and incident response?</h4> <div class="FAQPopup__ListItemTopIcon" data-drawer-id="4"> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M15.99 25.06a1.514 1.514 0 0 1-1.511-1.511V8.45c0-.833.678-1.512 1.511-1.512.834 0 1.512.679 1.512 1.512V23.55a1.51 1.51 0 0 1-1.492 1.512"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> </div> </div> <div class="FAQPopup__ListItemBottom"> <p>Both threat intelligence and incident response are crucial for enhancing your organization's cybersecurity capabilities. Threat intelligence provides valuable insights into emerging threats, attacker behaviors, and potential vulnerabilities, enabling organizations to identify and mitigate risks before they are exploited proactively. By leveraging threat intelligence, incident response is faster and more effective, minimizing attack duration and impact.</p> </div> </div> <div class="FAQPopup__ListItem" data-drawer-id="5"> <div class="FAQPopup__ListItemTop"> <h4>How do I evaluate Incident Response providers?</h4> <div class="FAQPopup__ListItemTopIcon" data-drawer-id="5"> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M15.99 25.06a1.514 1.514 0 0 1-1.511-1.511V8.45c0-.833.678-1.512 1.511-1.512.834 0 1.512.679 1.512 1.512V23.55a1.51 1.51 0 0 1-1.492 1.512"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> </div> </div> <div class="FAQPopup__ListItemBottom"> <p>You need an Incident Response service provider who can react quickly and efficacy. Having this immediate access to digital forensics technology and incident response expertise brings rapid control and stability to your organization when a breach occurs. How fast your organization contains, and recovers is critical to limiting business disruption, reducing costs, and recovering from reputational damage.</p> <p>Our <a href="/resources/library/10-questions-to-consider-when-evaluating-an-incident-response-provider">10 Questions to Consider When Evaluating an Incident Response Provider</a> guide can help you evaluate incident response providers and understand their incident response capabilities. The guide provides essential questions to consider when evaluating incident response service providers, offering insights into the importance of incident response, the challenges that your incident response service provider should address, and the top 10 questions to help you qualify potential incident response vendors. <a href="/resources/library/10-questions-to-consider-when-evaluating-an-incident-response-provider">Download the full guide here</a>.</p> </div> </div> <div class="FAQPopup__ListItem" data-drawer-id="6"> <div class="FAQPopup__ListItemTop"> <h4>How do eSentire Digital Forensics and Incident Response (DFIR) services work?</h4> <div class="FAQPopup__ListItemTopIcon" data-drawer-id="6"> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M15.99 25.06a1.514 1.514 0 0 1-1.511-1.511V8.45c0-.833.678-1.512 1.511-1.512.834 0 1.512.679 1.512 1.512V23.55a1.51 1.51 0 0 1-1.492 1.512"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> </div> </div> <div class="FAQPopup__ListItemBottom"> <p>When a breach occurs, our Digital Forensics and Incident Response (DFIR) service provides industry-leading protection with our 4-hour threat suppression SLA remotely delivered by our Cyber Security Investigations (CSI) team. Leveraging the best-in-class tools, our team identifies the root cause of security incidents and assesses the extent of compromised data and assets, facilitating a quick return to regular business operations. We also provide ongoing support throughout the recovery process.</p> </div> </div> <div class="FAQPopup__ListItem" data-drawer-id="7"> <div class="FAQPopup__ListItemTop"> <h4>Can eSentire Digital Forensics and Incident Response (DFIR) procedures be carried out remotely?</h4> <div class="FAQPopup__ListItemTopIcon" data-drawer-id="7"> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M15.99 25.06a1.514 1.514 0 0 1-1.511-1.511V8.45c0-.833.678-1.512 1.511-1.512.834 0 1.512.679 1.512 1.512V23.55a1.51 1.51 0 0 1-1.492 1.512"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> </div> </div> <div class="FAQPopup__ListItemBottom"> <p>eSentire Digital Forensics and Incident Response (DFIR) services can be carried out remotely. Moreover, the eSentire Agent, our proprietary digital forensics tool, enables remote rapid response so you can contain cyber threats and get back to normal business operations. Through a combination of best-in-class digital forensics technology and the expertise of our elite incident responders, our On-Demand 24/7 Incident Response service provides the fastest threat suppression in the industry, suppressing any incident, anywhere in the world, within 4 hours.</p> </div> </div> <div class="FAQPopup__ListItem" data-drawer-id="8"> <div class="FAQPopup__ListItemTop"> <h4>What type of Incident Response does eSentire offer with DFIR services?</h4> <div class="FAQPopup__ListItemTopIcon" data-drawer-id="8"> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M15.99 25.06a1.514 1.514 0 0 1-1.511-1.511V8.45c0-.833.678-1.512 1.511-1.512.834 0 1.512.679 1.512 1.512V23.55a1.51 1.51 0 0 1-1.492 1.512"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> </div> </div> <div class="FAQPopup__ListItemBottom"> <p><strong>IR Readiness Service:</strong> Our IR Readiness service removes administrative barriers that typically slows down incident response. We collect, store, and leverage relevant and meaningful data about your environment, pre-deploy forensic tools necessary to accelerate the IR process, and provide clarity regarding your true level of readiness. Our expert team assesses your IR readiness plan by walking your team through the IR process, reviewing the information environment, completing administrative tasks, and providing guidance on log configuration and forensic tool deployment.</p> <p><strong>On-Demand 24/7 Service (retainer):</strong> Our On-Demand 24/7 Incident Response provides end-to-end incident management guarantees that you’re prepared for the most advanced attacks. Through a combination of best-in-class digital forensics technology and the expertise of our elite incident responders, we provide the fastest threat suppression in the industry, suppressing any incident, anywhere in the world, within 4 hours.</p> <p><strong>Emergency Incident Response service:</strong> If you are not ready to be on a retainer model, we can also provide emergency Incident Response to anyone calling into our <a href="tel:1-866-579-2200">1-866-579-2200</a> phone line, if you suspect any malicious activities across your environment. Emergency IR does not guarantee a 4hr threat suppression. </p> </div> </div> <div class="FAQPopup__ListItem" data-drawer-id="9"> <div class="FAQPopup__ListItemTop"> <h4>What is the difference between Managed Detection and Response (MDR) and Digital Forensics and Incident Response (DFIR)?</h4> <div class="FAQPopup__ListItemTopIcon" data-drawer-id="9"> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M15.99 25.06a1.514 1.514 0 0 1-1.511-1.511V8.45c0-.833.678-1.512 1.511-1.512.834 0 1.512.679 1.512 1.512V23.55a1.51 1.51 0 0 1-1.492 1.512"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> </div> </div> <div class="FAQPopup__ListItemBottom"> <p><a href="/cybersecurity-fundamentals-defined/what-is-managed-detection-and-response">Managed Detection and Response (MDR)</a> continuous monitoring, threat detection, and response to potential security incidents. MDR providers use a combination of technology, threat intelligence, and human expertise to identify and address security threats in real-time. <a href="/what-we-do/esentire-managed-detection-and-response">MDR services</a> let you respond quickly when potential threats occur or become full blown security incident.</p> <p>Digital Forensics and Incident Response (DFIR) comes into play when a security incident has occurred. It involves the systematic process of investigating and responding to security breaches. Digital forensics is the practice of collecting, analyzing, and preserving electronic evidence to understand how the breach occurred. Incident response is the coordinated effort to contain, eradicate, and recover from the security incident. DFIR helps organizations understand the extent of the breach, identify the vulnerabilities exploited, and implement measures to prevent similar incidents in the future. </p> </div> </div> <div class="FAQPopup__ListItem" data-drawer-id="10"> <div class="FAQPopup__ListItemTop"> <h4>What are the benefits of having one provider for both MDR and Digital Forensics and Incident Response (DFIR) services?</h4> <div class="FAQPopup__ListItemTopIcon" data-drawer-id="10"> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M15.99 25.06a1.514 1.514 0 0 1-1.511-1.511V8.45c0-.833.678-1.512 1.511-1.512.834 0 1.512.679 1.512 1.512V23.55a1.51 1.51 0 0 1-1.492 1.512"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> </div> </div> <div class="FAQPopup__ListItemBottom"> <p>There are many benefits of leveraging <a href="/what-we-do/esentire-managed-detection-and-response">MDR services</a> and DFIR services from one provider including:</p> <p><strong>Streamlined workflows:</strong> When you combine the capabilities of an elite threat hunting team, incident responders within the SOC and a specialized digital forensics and IR team, you get better, faster and more accurate containment, evidence handling, remediation and root cause analysis. Given their familiarity with your environment, logs, and security tools, your MDR team is ideally positioned to handle high-pressure evidence-handling operations. Your MDR team can turn over the cyber incident investigation to digital forensics experts that they know well and are accustomed to working with, developing streamlined processes that will serve as a force multiplier in real-world attacks.</p> <p><strong>Know who to turn to in the moment of crisis:</strong> The faster you can respond, the more likely you are to reduce damage, mitigate costs and gather valuable evidence before attackers can destroy it. A team that’s already working within your environment has a massive advantage when it comes to acting quickly.</p> <p><strong>Alleviate the burden on your team:</strong> With a comprehensive end-to-end detection and response process established across the whole of the incident lifecycle, your internal security team can focus on the areas where they’re able to contribute the most value instead of worrying about “what ifs.”</p> <p>To learn more about why it’s necessary to enhance MDR services with Digital Forensics and Incident Response services, why you need to extend your MDR capabilities across the full incident lifecycle, and the benefits of combing MDR & Incident Response services, download our MDR and Incident Response eBook <a href="/resources/library/mdr-ir-a-recipe-for-cyber-resilience-in-a-twenty-first-century-risk-landscape">here</a>.</p> </div> </div> </div> </div> </div> </section> <script> let FAQPopUpCtas = document.querySelectorAll('.NotALLEqualMDR__ContentBottomCta'); let FAQPopUpCloseBtns = document.querySelectorAll('.FAQPopup__Close'); FAQPopUpCtas.forEach(FAQPopUpCta => { FAQPopUpCta.addEventListener('click', (e) => { e.preventDefault(); const id = FAQPopUpCta.getAttribute('data-modal-id'); document.querySelector(`.FAQPopup[data-modal-id="${id}"]`).classList.add('active'); document.getElementsByTagName("body")[0].style.overflow = "hidden"; }); }); FAQPopUpCloseBtns.forEach(FAQPopUpCloseBtn => { FAQPopUpCloseBtn.addEventListener('click', (e) => { e.preventDefault(); const id = FAQPopUpCloseBtn.getAttribute('data-modal-id'); document.querySelector(`.FAQPopup[data-modal-id="${id}"]`).classList.remove('active'); document.getElementsByTagName("body")[0].style.overflow = "auto"; }); }); </script> <script> let FAQPopupDrawerTriggers = document.querySelectorAll('.FAQPopup__ListItemTopIcon'); let FAQPopupDrawers = document.querySelectorAll('.FAQPopup__ListItem'); FAQPopupDrawerTriggers.forEach(FAQPopupDrawerTrigger => { FAQPopupDrawerTrigger.addEventListener('click', (e) => { e.preventDefault(); const drawerId = FAQPopupDrawerTrigger.getAttribute('data-drawer-id'); document.querySelector(`.FAQPopup__ListItem[data-drawer-id="${drawerId}"]`).classList.toggle('FAQPopup__ListItem--Open'); }); }); </script> <section class="TwoServices"> <div class="TwoServices__Content"> <div class="TwoServices__ContentTop"> <h2>Digital Forensics and Incident Response Services</h2> <p>eSentire Digital Forensics and Incident Response services are available for On-Demand 24/7 Incident Response or Emergency Incident Response support.</p> </div> <div class="TwoServices__Cards"> <div class="TwoServices__Card"> <div class="TwoServices__CardTop"> <h4>Proactive</h4> <h3>On-Demand 24/7 Incident Response</h3> <div class="TwoServices__Expanded"> <h3>Incident Response Retainer</h3> <ul> <li>4-hour threat suppression anywhere in the world</li> <li>Proprietary eSentire agent deployment across your network and IT systems the moment you on-board as a customer</li> <li>Rapid threat suppression within minutes of your call </li> </ul> <p>Choose one of the following services each year:</p> <h3>Incident Response Plan Development</h3> <ul> <li>Build an Incident Response Plan under the guidance of our cybersecurity experts using an industry-specific template</li> </ul> <h3>Incident Response Plan Assessment</h3> <ul> <li>Review your current Incident Response Plan to make sure you’re prepared to withstand and recover from cyberattacks</li> </ul> <h3>Tabletop Exercise (TTE)</h3> <ul> <li>Assess your readiness with an annual tabletop planning and mock drill testing exercise</li> <li>Our experts provide recommendations for necessary updates to your security program based on the exercise results</li> </ul> </div> </div> <a href="/get-started" class="TwoServices__CTA">GET STARTED</a> </div> <div class="TwoServices__Card"> <div class="TwoServices__CardTop"> <h4>Reactive</h4> <h3>Emergency Incident Response</h3> <div class="TwoServices__Expanded"> <h3>Supporting the End-to-End Incident Response Lifecycle</h3> <ul> <li>Rapid mobilization and deployment to quickly secure your systems and networks</li> <li>End-to-end incident management</li> <li>Managed threat containment</li> <li>Digital Forensic analysis collecting insights from your systems and networks</li> <li>Regression analysis to conclusively determine the full extent of compromised assets and determine root cause</li> <li>Incident recovery</li> <li>Determination of extent</li> <li>Stakeholder reporting</li> <li>Compliance support to meet regulatory requirements with centralized collection, retention and reports of log, network and endpoint data</li> <li>Litigation support as required</li> <li>Crisis communication support as required</li> </ul> </div> </div> <a href="tel:1-866-579-2200" class="TwoServices__CTA">CALL 1-866-579-2200</a> </div> </div> </div> </section> <section class="UseCaseDrawers UseCaseDrawers__DFIR"> <div class="UseCaseDrawers__Content"> <div class="UseCaseDrawers__ContentTop"> <h2>eSentire Standard<br> Emergency Incident Response Process</h2> <p>eSentire’s typical process for case intake and commencement of an investigation is:</p> </div> <div class="UseCaseDrawers__Drawers"> <div class="UseCaseDrawers__Drawer" data-use-case-drawer="1"> <div class="UseCaseDrawers__DrawerTop"> <div class="UseCaseDrawers__DrawerTopHeadingIcon"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 42 42"><path d="M33.7 42c-1.8 0-4.1-.8-7-2.4-4.2-2.4-9.1-6.2-13.7-10.8C4.3 20-2.7 9.3 1 5.6L7.3.2c.2-.2.5-.3.7-.2.3 0 .5.2.7.4l7.8 9.6c.3.4.3.8 0 1.2l-3.9 5.4 12.7 12.7 5.4-3.9c.4-.3.9-.2 1.2 0l9.6 7.8c.2.2.3.4.4.7 0 .3 0 .5-.2.7l-5.3 6.2v.1c-.6.6-1.5 1-2.7 1ZM2.4 7c-1.7 1.9 2.1 10.4 12 20.4 4.5 4.5 9.2 8.2 13.3 10.5 4.3 2.4 6.6 2.4 7.3 1.8l4.6-5.4-8.2-6.7-5.5 3.9c-.4.3-.9.2-1.3-.1L10.7 17.5c-.3-.3-.4-.9-.1-1.3l3.9-5.5-6.7-8.3L2.4 7Z" style="fill:#19234d"/></svg> <h3>Call Answered</h3> </div> <div class="UseCaseDrawers__DrawerTopIcon" data-use-case-drawer="1"> <svg xmlns="http://www.w3.org/2000/svg" width="33.019" height="33.019"><defs><clipPath id="a"><path fill="#a8b1d3" d="M0 0h33.019v33.019H0z" data-name="Rectangle 625"/></clipPath></defs><g data-name="Group 1511"><g fill="#a8b1d3" clip-path="url(#a)" data-name="Group 1510"><path d="M16.51 33.019A16.51 16.51 0 1 1 33.021 16.51 16.529 16.529 0 0 1 16.51 33.019m0-29.911a13.4 13.4 0 1 0 13.4 13.4 13.417 13.417 0 0 0-13.4-13.4" data-name="Path 3029"/><path d="M16.51 25.856a1.555 1.555 0 0 1-1.554-1.554V8.72a1.554 1.554 0 1 1 3.109 0v15.578a1.555 1.555 0 0 1-1.555 1.558" data-name="Path 3030"/><path d="M24.298 18.066H8.72a1.554 1.554 0 1 1 0-3.109h15.578a1.554 1.554 0 1 1 0 3.109" data-name="Path 3031"/></g></g></svg> <svg xmlns="http://www.w3.org/2000/svg" width="33.019" height="33.019"><defs><clipPath id="a"><path fill="#a8b1d3" d="M0 0h33.019v33.019H0z" data-name="Rectangle 625"/></clipPath></defs><g data-name="Group 1719"><g fill="#a8b1d3" clip-path="url(#a)" data-name="Group 1510"><path d="M16.51 33.019A16.51 16.51 0 1 1 33.021 16.51 16.529 16.529 0 0 1 16.51 33.019m0-29.911a13.4 13.4 0 1 0 13.4 13.4 13.417 13.417 0 0 0-13.4-13.4" data-name="Path 3029"/><path d="M24.298 18.066H8.72a1.554 1.554 0 1 1 0-3.109h15.578a1.554 1.554 0 1 1 0 3.109" data-name="Path 3031"/></g></g></svg> </div> </div> <div class="UseCaseDrawers__DrawerBottom"> <div class="UseCaseDrawers__DrawerBottomCopy"> <p>Our #800 hotline is answered by a live responder 24/7 where the case will be triaged, and resources will be assigned.</p> </div> </div> </div> <div class="UseCaseDrawers__DrawerConnector"></div> <div class="UseCaseDrawers__Drawer" data-use-case-drawer="2"> <div class="UseCaseDrawers__DrawerTop"> <div class="UseCaseDrawers__DrawerTopHeadingIcon"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 42 42"><defs><style>.cls-DetailScoping1{fill:#19234d}</style></defs><g id="Layer_1"><path d="M21 42c-.6 0-1-.4-1-1v-8.3c0-.6.4-1 1-1s1 .4 1 1V41c0 .6-.4 1-1 1ZM21 10.3c-.6 0-1-.4-1-1V1c0-.6.4-1 1-1s1 .4 1 1v8.3c0 .6-.4 1-1 1ZM41 22h-8.3c-.6 0-1-.4-1-1s.4-1 1-1H41c.6 0 1 .4 1 1s-.4 1-1 1ZM9.3 22H1c-.6 0-1-.4-1-1s.4-1 1-1h8.3c.6 0 1 .4 1 1s-.4 1-1 1Z" class="cls-DetailScoping1"/><path d="M21 37.7c-9.2 0-16.7-7.5-16.7-16.7S11.8 4.3 21 4.3 37.7 11.8 37.7 21 30.2 37.7 21 37.7Zm0-31.4C12.9 6.3 6.3 12.9 6.3 21S12.9 35.7 21 35.7 35.7 29.1 35.7 21 29.1 6.3 21 6.3Z" class="cls-DetailScoping1"/></g></svg> <h3>Detailed Scoping Call</h3> </div> <div class="UseCaseDrawers__DrawerTopIcon" data-use-case-drawer="2"> <svg xmlns="http://www.w3.org/2000/svg" width="33.019" height="33.019"><defs><clipPath id="a"><path fill="#a8b1d3" d="M0 0h33.019v33.019H0z" data-name="Rectangle 625"/></clipPath></defs><g data-name="Group 1511"><g fill="#a8b1d3" clip-path="url(#a)" data-name="Group 1510"><path d="M16.51 33.019A16.51 16.51 0 1 1 33.021 16.51 16.529 16.529 0 0 1 16.51 33.019m0-29.911a13.4 13.4 0 1 0 13.4 13.4 13.417 13.417 0 0 0-13.4-13.4" data-name="Path 3029"/><path d="M16.51 25.856a1.555 1.555 0 0 1-1.554-1.554V8.72a1.554 1.554 0 1 1 3.109 0v15.578a1.555 1.555 0 0 1-1.555 1.558" data-name="Path 3030"/><path d="M24.298 18.066H8.72a1.554 1.554 0 1 1 0-3.109h15.578a1.554 1.554 0 1 1 0 3.109" data-name="Path 3031"/></g></g></svg> <svg xmlns="http://www.w3.org/2000/svg" width="33.019" height="33.019"><defs><clipPath id="a"><path fill="#a8b1d3" d="M0 0h33.019v33.019H0z" data-name="Rectangle 625"/></clipPath></defs><g data-name="Group 1719"><g fill="#a8b1d3" clip-path="url(#a)" data-name="Group 1510"><path d="M16.51 33.019A16.51 16.51 0 1 1 33.021 16.51 16.529 16.529 0 0 1 16.51 33.019m0-29.911a13.4 13.4 0 1 0 13.4 13.4 13.417 13.417 0 0 0-13.4-13.4" data-name="Path 3029"/><path d="M24.298 18.066H8.72a1.554 1.554 0 1 1 0-3.109h15.578a1.554 1.554 0 1 1 0 3.109" data-name="Path 3031"/></g></g></svg> </div> </div> <div class="UseCaseDrawers__DrawerBottom"> <div class="UseCaseDrawers__DrawerBottomCopy"> <p>We will perform a detailed scoping call to assess the issue and develop potential response strategies. We will inform you of our plan, what you can expect, and when deliverables & findings should be expected.</p> </div> </div> </div> <div class="UseCaseDrawers__DrawerConnector"></div> <div class="UseCaseDrawers__Drawer" data-use-case-drawer="3"> <div class="UseCaseDrawers__DrawerTop"> <div class="UseCaseDrawers__DrawerTopHeadingIcon"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 36.8 42"><defs><style>.cls-RemoteWork1{fill:#19234d}</style></defs><g id="Layer_1"><path d="M21.4 42H7.1c-.3 0-.6-.1-.8-.4s-.3-.5-.2-.8L8.6 28c-1.1-1.1-3.9-4.3-4.8-9.4 0-.5.3-1.1.8-1.2.5 0 1.1.3 1.2.8 1 5.6 4.6 8.7 4.6 8.7.3.2.4.6.3 1L8.3 40.1h12.5l1-2.1c.1-.3.4-.5.7-.5l6-1.3c.7-.2 1.2-.7 1.3-1.4l1.1-8.5c0-.4.3-.7.7-.8l3-1-2.3-6.8c-.2-.5.1-1.1.6-1.3.5-.2 1.1.1 1.3.6l2.6 7.7c.2.5-.1 1.1-.6 1.3l-3.3 1.1-1 7.8c-.2 1.5-1.3 2.8-2.8 3.1l-5.5 1.2-1.1 2.2c-.2.3-.5.6-.9.6Z" class="cls-RemoteWork1"/><path d="M33.1 18.3c-.6 0-1-.4-1-1v-2.2C32.1 8 25.8 2 18.4 2s-1.1 0-1.7.1c-.6 0-1.1-.3-1.1-.9 0-.5.3-1 .9-1.1.6 0 1.3-.1 1.9-.1 8.5 0 15.7 6.9 15.7 15.1v2.2c0 .6-.4 1-1 1ZM7.5 15c-1 0-1.8-.8-2-1.8 0 0-.2-.3-.3-.4 0 0-.2 0-.3.2-.8.6-2 .6-2.7-.1-.7-.7-.7-1.9 0-2.7 0-.1.2-.3.2-.3v-.2c-.2 0-.3 0-.5-.1-1-.2-1.8-1-1.8-2s.8-1.8 1.8-2c0 0 .3-.2.4-.4 0 0 0-.2-.2-.3-.6-.8-.6-2 .1-2.7.7-.7 1.9-.7 2.7 0 .1 0 .3.2.3.2h.2c0-.2 0-.3.1-.4.2-1.2 1.1-2 2-2 1 0 1.8.8 2 1.9 0 0 .2.3.4.4 0 0 .2 0 .3-.2.8-.6 2-.6 2.7 0 .7.7.7 1.9 0 2.7l-.2.3v.3c.2 0 .3 0 .5.1 1 .2 1.8 1 1.8 2s-.8 1.8-1.9 2c0 0-.3.2-.4.3 0 0 0 .2.2.3.6.8.6 2-.1 2.7-.7.7-1.9.7-2.7 0-.1 0-.2-.1-.3-.2h-.2c0 .2 0 .3-.1.5-.2 1-1 1.8-2 1.8Zm-2.2-4.3c.2 0 .4 0 .6.1.4.2 1.4 1.1 1.5 2 0-.3.3-1.6 1.2-1.9l.6-.3h.1c.6-.3.7-.1 1.8.7-.4-.6-.8-1.5-.5-2.3.2-.4 1-1.4 2-1.5-.3 0-1.5-.3-1.8-1.2v-.4c-.5-.6-.5-.6-.5-.9s0-.3.7-1.3c-.6.4-1.5.8-2.2.4-.3-.2-1.4-1-1.6-2-.1.7-.5 1.6-1.2 1.8l-.4.2c-.7.3-1.6 0-2.2-.5.4.6.8 1.5.4 2.2-.2.4-1.1 1.4-2 1.6.3 0 1.6.3 1.9 1.2l.2.4c.3.7 0 1.6-.5 2.2.4-.3 1-.6 1.6-.6ZM2.4 10ZM5 2.4Z" class="cls-RemoteWork1"/><path d="M7.6 9.8c-1.3 0-2.3-1-2.3-2.3s1-2.3 2.3-2.3 2.3 1 2.3 2.3-1 2.3-2.3 2.3Zm0-2.6c-.2 0-.3.1-.3.3s.1.3.3.3.3-.1.3-.3-.1-.3-.3-.3Z" class="cls-RemoteWork1"/></g></svg> <h3>Remote Work Will Begin and an On-site Specialist Is Deployed If Required</h3> </div> <div class="UseCaseDrawers__DrawerTopIcon" data-use-case-drawer="3"> <svg xmlns="http://www.w3.org/2000/svg" width="33.019" height="33.019"><defs><clipPath id="a"><path fill="#a8b1d3" d="M0 0h33.019v33.019H0z" data-name="Rectangle 625"/></clipPath></defs><g data-name="Group 1511"><g fill="#a8b1d3" clip-path="url(#a)" data-name="Group 1510"><path d="M16.51 33.019A16.51 16.51 0 1 1 33.021 16.51 16.529 16.529 0 0 1 16.51 33.019m0-29.911a13.4 13.4 0 1 0 13.4 13.4 13.417 13.417 0 0 0-13.4-13.4" data-name="Path 3029"/><path d="M16.51 25.856a1.555 1.555 0 0 1-1.554-1.554V8.72a1.554 1.554 0 1 1 3.109 0v15.578a1.555 1.555 0 0 1-1.555 1.558" data-name="Path 3030"/><path d="M24.298 18.066H8.72a1.554 1.554 0 1 1 0-3.109h15.578a1.554 1.554 0 1 1 0 3.109" data-name="Path 3031"/></g></g></svg> <svg xmlns="http://www.w3.org/2000/svg" width="33.019" height="33.019"><defs><clipPath id="a"><path fill="#a8b1d3" d="M0 0h33.019v33.019H0z" data-name="Rectangle 625"/></clipPath></defs><g data-name="Group 1719"><g fill="#a8b1d3" clip-path="url(#a)" data-name="Group 1510"><path d="M16.51 33.019A16.51 16.51 0 1 1 33.021 16.51 16.529 16.529 0 0 1 16.51 33.019m0-29.911a13.4 13.4 0 1 0 13.4 13.4 13.417 13.417 0 0 0-13.4-13.4" data-name="Path 3029"/><path d="M24.298 18.066H8.72a1.554 1.554 0 1 1 0-3.109h15.578a1.554 1.554 0 1 1 0 3.109" data-name="Path 3031"/></g></g></svg> </div> </div> <div class="UseCaseDrawers__DrawerBottom"> <div class="UseCaseDrawers__DrawerBottomCopy"> <p>With eSentire Agent, a market leading technology with remote forensic capabilities, almost all incident response work can be performed very quickly, from a remote location. If onsite resources are required, a minimum of one DFIR specialist will be deployed as soon as possible, in no case later than 24 hours, choosing the most efficient travel option (fly, drive, etc.).</p> </div> </div> </div> <div class="UseCaseDrawers__DrawerConnector"></div> <div class="UseCaseDrawers__Drawer" data-use-case-drawer="4"> <div class="UseCaseDrawers__DrawerTop"> <div class="UseCaseDrawers__DrawerTopHeadingIcon"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34.3 42"><defs><style>.cls-ScopeWork1{fill:#19234d}</style></defs><g id="Layer_1"><path d="M18.7 37.4H2.2c-1.2 0-2.2-1-2.2-2.2v-33C0 1 1 0 2.2 0h25.4c1.2 0 2.2 1 2.2 2.2v24.2c0 .6-.4 1-1 1s-1-.4-1-1V2.2s0-.2-.2-.2H2.2S2 2 2 2.2v33c0 .1 0 .2.2.2h16.5c.6 0 1 .4 1 1s-.4 1-1 1Z" class="cls-ScopeWork1"/><path d="M24.1 21.7H5.6c-.6 0-1-.4-1-1s.4-1 1-1h18.5c.6 0 1 .4 1 1s-.4 1-1 1ZM24.1 26.2H5.6c-.6 0-1-.4-1-1s.4-1 1-1h18.5c.6 0 1 .4 1 1s-.4 1-1 1ZM17.2 30.7H5.6c-.6 0-1-.4-1-1s.4-1 1-1h11.5c.6 0 1 .4 1 1s-.4 1-1 1ZM24.1 12.8H5.6c-.6 0-1-.4-1-1s.4-1 1-1h18.5c.6 0 1 .4 1 1s-.4 1-1 1ZM24.1 8.3H5.6c-.6 0-1-.4-1-1s.4-1 1-1h18.5c.6 0 1 .4 1 1s-.4 1-1 1ZM24.1 17.3H5.6c-.6 0-1-.4-1-1s.4-1 1-1h18.5c.6 0 1 .4 1 1s-.4 1-1 1ZM27.2 40.5c-3.1 0-5.6-2.5-5.6-5.6s2.5-5.6 5.6-5.6 5.6 2.5 5.6 5.6-2.5 5.6-5.6 5.6Zm0-9.3c-2 0-3.6 1.6-3.6 3.6s1.6 3.6 3.6 3.6 3.6-1.6 3.6-3.6-1.6-3.6-3.6-3.6Z" class="cls-ScopeWork1"/><path d="M33.3 42c-.3 0-.5 0-.7-.3l-2.9-2.9c-.4-.4-.4-1 0-1.4s1-.4 1.4 0l2.9 2.9c.4.4.4 1 0 1.4-.2.2-.5.3-.7.3Z" class="cls-ScopeWork1"/></g></svg> <h3>Scope of Work</h3> </div> <div class="UseCaseDrawers__DrawerTopIcon" data-use-case-drawer="4"> <svg xmlns="http://www.w3.org/2000/svg" width="33.019" height="33.019"><defs><clipPath id="a"><path fill="#a8b1d3" d="M0 0h33.019v33.019H0z" data-name="Rectangle 625"/></clipPath></defs><g data-name="Group 1511"><g fill="#a8b1d3" clip-path="url(#a)" data-name="Group 1510"><path d="M16.51 33.019A16.51 16.51 0 1 1 33.021 16.51 16.529 16.529 0 0 1 16.51 33.019m0-29.911a13.4 13.4 0 1 0 13.4 13.4 13.417 13.417 0 0 0-13.4-13.4" data-name="Path 3029"/><path d="M16.51 25.856a1.555 1.555 0 0 1-1.554-1.554V8.72a1.554 1.554 0 1 1 3.109 0v15.578a1.555 1.555 0 0 1-1.555 1.558" data-name="Path 3030"/><path d="M24.298 18.066H8.72a1.554 1.554 0 1 1 0-3.109h15.578a1.554 1.554 0 1 1 0 3.109" data-name="Path 3031"/></g></g></svg> <svg xmlns="http://www.w3.org/2000/svg" width="33.019" height="33.019"><defs><clipPath id="a"><path fill="#a8b1d3" d="M0 0h33.019v33.019H0z" data-name="Rectangle 625"/></clipPath></defs><g data-name="Group 1719"><g fill="#a8b1d3" clip-path="url(#a)" data-name="Group 1510"><path d="M16.51 33.019A16.51 16.51 0 1 1 33.021 16.51 16.529 16.529 0 0 1 16.51 33.019m0-29.911a13.4 13.4 0 1 0 13.4 13.4 13.417 13.417 0 0 0-13.4-13.4" data-name="Path 3029"/><path d="M24.298 18.066H8.72a1.554 1.554 0 1 1 0-3.109h15.578a1.554 1.554 0 1 1 0 3.109" data-name="Path 3031"/></g></g></svg> </div> </div> <div class="UseCaseDrawers__DrawerBottom"> <div class="UseCaseDrawers__DrawerBottomCopy"> <p>We will provide a complete SOW in the agreed upon format with clear objectives and work requirements.</p> </div> </div> </div> <div class="UseCaseDrawers__DrawerConnector"></div> <div class="UseCaseDrawers__Drawer" data-use-case-drawer="5"> <div class="UseCaseDrawers__DrawerTop"> <div class="UseCaseDrawers__DrawerTopHeadingIcon"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 42 42"><defs><style>.cls-KickOff1{fill:#19234d}</style></defs><g id="Layer_1"><path d="M23.6 9.8H6.2c-.6 0-1-.4-1-1s.4-1 1-1h17.4c.6 0 1 .4 1 1s-.4 1-1 1ZM18.4 14.2H6.2c-.6 0-1-.4-1-1s.4-1 1-1h12.2c.6 0 1 .4 1 1s-.4 1-1 1Z" class="cls-KickOff1"/><path d="M26.1 22H5.7c-.6 0-1-.4-1-1s.4-1 1-1h20.4c1 0 1.8-.8 1.8-1.8V3.8c0-1-.8-1.8-1.8-1.8H3.8C2.8 2 2 2.8 2 3.8v17.3c0 .6-.4 1-1 1s-1-.4-1-1V3.8C0 1.7 1.7 0 3.8 0h22.3c2.1 0 3.8 1.7 3.8 3.8v14.5c0 2.1-1.7 3.8-3.8 3.8Z" class="cls-KickOff1"/><path d="M1 29H.7c-.4-.1-.7-.5-.7-1v-6.9c0-.6.4-1 1-1s1 .4 1 1v3.6l2.8-4.2c.3-.5.9-.6 1.4-.3s.6.9.3 1.4l-4.7 6.9c-.2.3-.5.4-.8.4ZM36.3 35.1H15.9c-2.1 0-3.8-1.7-3.8-3.8v-5.1c0-.6.4-1 1-1s1 .4 1 1v5.1c0 1 .8 1.8 1.8 1.8h20.4c.6 0 1 .4 1 1s-.4 1-1 1ZM41 35.1c-.6 0-1-.4-1-1V16.8c0-1-.8-1.8-1.8-1.8H34c-.6 0-1-.4-1-1s.4-1 1-1h4.2c2.1 0 3.8 1.7 3.8 3.8v17.3c0 .6-.4 1-1 1Z" class="cls-KickOff1"/><path d="M41 42c-.3 0-.6-.2-.8-.4l-4.7-6.9c-.3-.5-.2-1.1.3-1.4.5-.3 1.1-.2 1.4.3l2.8 4.2v-3.6c0-.6.4-1 1-1s1 .4 1 1v6.9c0 .4-.3.8-.7 1H41Z" class="cls-KickOff1"/></g></svg> <h3>Kick-off Call and Artifact Collection</h3> </div> <div class="UseCaseDrawers__DrawerTopIcon" data-use-case-drawer="5"> <svg xmlns="http://www.w3.org/2000/svg" width="33.019" height="33.019"><defs><clipPath id="a"><path fill="#a8b1d3" d="M0 0h33.019v33.019H0z" data-name="Rectangle 625"/></clipPath></defs><g data-name="Group 1511"><g fill="#a8b1d3" clip-path="url(#a)" data-name="Group 1510"><path d="M16.51 33.019A16.51 16.51 0 1 1 33.021 16.51 16.529 16.529 0 0 1 16.51 33.019m0-29.911a13.4 13.4 0 1 0 13.4 13.4 13.417 13.417 0 0 0-13.4-13.4" data-name="Path 3029"/><path d="M16.51 25.856a1.555 1.555 0 0 1-1.554-1.554V8.72a1.554 1.554 0 1 1 3.109 0v15.578a1.555 1.555 0 0 1-1.555 1.558" data-name="Path 3030"/><path d="M24.298 18.066H8.72a1.554 1.554 0 1 1 0-3.109h15.578a1.554 1.554 0 1 1 0 3.109" data-name="Path 3031"/></g></g></svg> <svg xmlns="http://www.w3.org/2000/svg" width="33.019" height="33.019"><defs><clipPath id="a"><path fill="#a8b1d3" d="M0 0h33.019v33.019H0z" data-name="Rectangle 625"/></clipPath></defs><g data-name="Group 1719"><g fill="#a8b1d3" clip-path="url(#a)" data-name="Group 1510"><path d="M16.51 33.019A16.51 16.51 0 1 1 33.021 16.51 16.529 16.529 0 0 1 16.51 33.019m0-29.911a13.4 13.4 0 1 0 13.4 13.4 13.417 13.417 0 0 0-13.4-13.4" data-name="Path 3029"/><path d="M24.298 18.066H8.72a1.554 1.554 0 1 1 0-3.109h15.578a1.554 1.554 0 1 1 0 3.109" data-name="Path 3031"/></g></g></svg> </div> </div> <div class="UseCaseDrawers__DrawerBottom"> <div class="UseCaseDrawers__DrawerBottomCopy"> <p>We will conduct a kick-off call and begin artifact collection and deployment of our toolset across the affected environment. As we collect artifacts from the impacted environment we will begin to normalize, enrich, and analyze the data.</p> </div> </div> </div> <div class="UseCaseDrawers__DrawerConnector"></div> <div class="UseCaseDrawers__Drawer" data-use-case-drawer="6"> <div class="UseCaseDrawers__DrawerTop"> <div class="UseCaseDrawers__DrawerTopHeadingIcon"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 42 42"><defs><style>.cls-TriagePhase1{fill:#19234d}</style></defs><g id="Layer_1"><path d="M21 26.3c-.6 0-1-.4-1-1v-7c0-.6.4-1 1-1s1 .4 1 1v7c0 .6-.4 1-1 1Z" class="cls-TriagePhase1"/><path d="M21 32.7c-.6 0-1-.4-1-1v-6.3c0-.6.4-1 1-1s1 .4 1 1v6.3c0 .6-.4 1-1 1ZM36.7 32.7c-.6 0-1-.4-1-1v-6.3c0-.6.4-1 1-1s1 .4 1 1v6.3c0 .6-.4 1-1 1ZM5.3 32.7c-.6 0-1-.4-1-1v-6.3c0-.6.4-1 1-1s1 .4 1 1v6.3c0 .6-.4 1-1 1Z" class="cls-TriagePhase1"/><path d="M36.7 26.3H5.3c-.6 0-1-.4-1-1s.4-1 1-1h31.3c.6 0 1 .4 1 1s-.4 1-1 1ZM25.3 42h-8.7c-.6 0-1-.4-1-1v-8.7c0-.6.4-1 1-1h8.7c.6 0 1 .4 1 1V41c0 .6-.4 1-1 1Zm-7.6-2h6.7v-6.7h-6.7V40ZM41 42h-8.7c-.6 0-1-.4-1-1v-8.7c0-.6.4-1 1-1H41c.6 0 1 .4 1 1V41c0 .6-.4 1-1 1Zm-7.7-2H40v-6.7h-6.7V40ZM9.7 42H1c-.6 0-1-.4-1-1v-8.7c0-.6.4-1 1-1h8.7c.6 0 1 .4 1 1V41c0 .6-.4 1-1 1ZM2 40h6.7v-6.7H2V40ZM21 19.4c-5.3 0-9.7-4.3-9.7-9.7S15.7 0 21 0s9.7 4.3 9.7 9.7-4.4 9.7-9.7 9.7ZM21 2c-4.2 0-7.7 3.5-7.7 7.7s3.5 7.7 7.7 7.7 7.7-3.5 7.7-7.7S25.2 2 21 2Z" class="cls-TriagePhase1"/><path d="M21 15.2c-.5 0-.9-.3-1-.8-.1-.5.2-1.1.8-1.2.1 0 2.8-.7 3.1-5.1-1.8-.8-3.4-2.1-3.5-2.1-.4-.3-.5-1-.2-1.4s1-.5 1.4-.2c0 0 1.9 1.5 3.6 2.1.4.1.7.5.7.9 0 6.7-4.5 7.7-4.7 7.7H21Z" class="cls-TriagePhase1"/><path d="M21 15.2h-.2c-.2 0-4.7-1-4.7-7.7s.3-.8.7-.9c1.8-.6 3.6-2.1 3.6-2.1.4-.3 1.1-.3 1.4.2.3.4.3 1.1-.2 1.4 0 0-1.7 1.4-3.5 2.1.3 4.4 3.1 5 3.1 5.1.5.1.9.6.8 1.2 0 .5-.5.8-1 .8Z" class="cls-TriagePhase1"/></g></svg> <h3>Triage Phase</h3> </div> <div class="UseCaseDrawers__DrawerTopIcon" data-use-case-drawer="6"> <svg xmlns="http://www.w3.org/2000/svg" width="33.019" height="33.019"><defs><clipPath id="a"><path fill="#a8b1d3" d="M0 0h33.019v33.019H0z" data-name="Rectangle 625"/></clipPath></defs><g data-name="Group 1511"><g fill="#a8b1d3" clip-path="url(#a)" data-name="Group 1510"><path d="M16.51 33.019A16.51 16.51 0 1 1 33.021 16.51 16.529 16.529 0 0 1 16.51 33.019m0-29.911a13.4 13.4 0 1 0 13.4 13.4 13.417 13.417 0 0 0-13.4-13.4" data-name="Path 3029"/><path d="M16.51 25.856a1.555 1.555 0 0 1-1.554-1.554V8.72a1.554 1.554 0 1 1 3.109 0v15.578a1.555 1.555 0 0 1-1.555 1.558" data-name="Path 3030"/><path d="M24.298 18.066H8.72a1.554 1.554 0 1 1 0-3.109h15.578a1.554 1.554 0 1 1 0 3.109" data-name="Path 3031"/></g></g></svg> <svg xmlns="http://www.w3.org/2000/svg" width="33.019" height="33.019"><defs><clipPath id="a"><path fill="#a8b1d3" d="M0 0h33.019v33.019H0z" data-name="Rectangle 625"/></clipPath></defs><g data-name="Group 1719"><g fill="#a8b1d3" clip-path="url(#a)" data-name="Group 1510"><path d="M16.51 33.019A16.51 16.51 0 1 1 33.021 16.51 16.529 16.529 0 0 1 16.51 33.019m0-29.911a13.4 13.4 0 1 0 13.4 13.4 13.417 13.417 0 0 0-13.4-13.4" data-name="Path 3029"/><path d="M24.298 18.066H8.72a1.554 1.554 0 1 1 0-3.109h15.578a1.554 1.554 0 1 1 0 3.109" data-name="Path 3031"/></g></g></svg> </div> </div> <div class="UseCaseDrawers__DrawerBottom"> <div class="UseCaseDrawers__DrawerBottomCopy"> <p>eSentire will deliver findings as to the extent of the attack, the type/variant of malware deployed, and make recommendations as to the isolation/containment of those devices that may have embedded persistence mechanisms or warrant further investigation.</p> </div> </div> </div> <div class="UseCaseDrawers__DrawerConnector"></div> <div class="UseCaseDrawers__Drawer" data-use-case-drawer="7"> <div class="UseCaseDrawers__DrawerTop"> <div class="UseCaseDrawers__DrawerTopHeadingIcon"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 38.5 42"><defs><style>.cls-CadenceCalls1{fill:#19234d}</style></defs><g id="Layer_1"><path d="M6.7 42c-2.1 0-3.8-2.3-5-6.6C.6 31.5 0 26.4 0 20.9 0 10.5 2.3 0 6.7 0h.1l6.8.5c.3 0 .5.2.7.4s.3.5.2.7l-1 10.2c0 .4-.4.8-.8.9l-5.3.9v14.7l5.3.9c.4 0 .8.4.8.9l1 10.2c0 .3 0 .5-.2.7s-.4.3-.7.4l-6.8.6h-.1Zm0-40C4.7 2.1 2 9.4 2 20.9c0 5.3.6 10.2 1.6 13.9 1 3.6 2.3 5.2 3.1 5.2l5.7-.5-.9-8.5-5.4-.9c-.5 0-.8-.5-.8-1V12.8c0-.5.4-.9.8-1l5.4-.9.8-8.5-5.7-.5ZM31.7 42h-.1l-6.8-.6c-.3 0-.5-.2-.7-.4s-.3-.5-.2-.7l1-10.2c0-.4.4-.8.8-.9l5.3-.9V13.6l-5.3-.9c-.4 0-.8-.4-.8-.9l-1-10.2c0-.3 0-.5.2-.7s.4-.3.7-.4l6.8-.5h.1c4.4 0 6.7 10.5 6.7 20.9 0 5.4-.6 10.6-1.7 14.5-1.2 4.3-3 6.6-5 6.6ZM26 39.5l5.8.5c.8 0 2-1.6 3-5.2 1.1-3.7 1.6-8.7 1.6-13.9C36.4 9.4 33.6 2 31.7 2l-5.7.5.8 8.5 5.4.9c.5 0 .8.5.8 1v16.4c0 .5-.4.9-.8 1l-5.4.9-.9 8.5Z" class="cls-CadenceCalls1"/><path d="M21.9 22c-.3 0-.5 0-.7-.3-.4-.4-.4-1 0-1.4l2.5-2.5-2.5-2.5c-.4-.4-.4-1 0-1.4s1-.4 1.4 0l3.2 3.2c.4.4.4 1 0 1.4l-3.2 3.2c-.2.2-.5.3-.7.3Z" class="cls-CadenceCalls1"/><path d="M25.2 18.8H13.3c-.6 0-1-.4-1-1s.4-1 1-1h11.9c.6 0 1 .4 1 1s-.4 1-1 1ZM16.5 28.5c-.3 0-.5 0-.7-.3L12.6 25c-.2-.2-.3-.4-.3-.7s.1-.5.3-.7l3.2-3.2c.4-.4 1-.4 1.4 0s.4 1 0 1.4l-2.5 2.5 2.5 2.5c.4.4.4 1 0 1.4-.2.2-.5.3-.7.3Z" class="cls-CadenceCalls1"/><path d="M25.2 25.2H13.3c-.6 0-1-.4-1-1s.4-1 1-1h11.9c.6 0 1 .4 1 1s-.4 1-1 1Z" class="cls-CadenceCalls1"/></g></svg> <h3>Cadence of Calls</h3> </div> <div class="UseCaseDrawers__DrawerTopIcon" data-use-case-drawer="7"> <svg xmlns="http://www.w3.org/2000/svg" width="33.019" height="33.019"><defs><clipPath id="a"><path fill="#a8b1d3" d="M0 0h33.019v33.019H0z" data-name="Rectangle 625"/></clipPath></defs><g data-name="Group 1511"><g fill="#a8b1d3" clip-path="url(#a)" data-name="Group 1510"><path d="M16.51 33.019A16.51 16.51 0 1 1 33.021 16.51 16.529 16.529 0 0 1 16.51 33.019m0-29.911a13.4 13.4 0 1 0 13.4 13.4 13.417 13.417 0 0 0-13.4-13.4" data-name="Path 3029"/><path d="M16.51 25.856a1.555 1.555 0 0 1-1.554-1.554V8.72a1.554 1.554 0 1 1 3.109 0v15.578a1.555 1.555 0 0 1-1.555 1.558" data-name="Path 3030"/><path d="M24.298 18.066H8.72a1.554 1.554 0 1 1 0-3.109h15.578a1.554 1.554 0 1 1 0 3.109" data-name="Path 3031"/></g></g></svg> <svg xmlns="http://www.w3.org/2000/svg" width="33.019" height="33.019"><defs><clipPath id="a"><path fill="#a8b1d3" d="M0 0h33.019v33.019H0z" data-name="Rectangle 625"/></clipPath></defs><g data-name="Group 1719"><g fill="#a8b1d3" clip-path="url(#a)" data-name="Group 1510"><path d="M16.51 33.019A16.51 16.51 0 1 1 33.021 16.51 16.529 16.529 0 0 1 16.51 33.019m0-29.911a13.4 13.4 0 1 0 13.4 13.4 13.417 13.417 0 0 0-13.4-13.4" data-name="Path 3029"/><path d="M24.298 18.066H8.72a1.554 1.554 0 1 1 0-3.109h15.578a1.554 1.554 0 1 1 0 3.109" data-name="Path 3031"/></g></g></svg> </div> </div> <div class="UseCaseDrawers__DrawerBottom"> <div class="UseCaseDrawers__DrawerBottomCopy"> <p>We will set the cadence for technical and leadership update calls. eSentire will deliver updates at a cadence to ensure your needs are met.</p> </div> </div> </div> <div class="UseCaseDrawers__DrawerConnector"></div> <div class="UseCaseDrawers__Drawer" data-use-case-drawer="8"> <div class="UseCaseDrawers__DrawerTop"> <div class="UseCaseDrawers__DrawerTopHeadingIcon"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 42 42"><defs><style>.cls-ThreatSuppression1{fill:#19234d}</style></defs><g id="Layer_1"><path d="M21.3 25.8c-.5 0-.9-.3-1-.8-.1-.5.2-1.1.8-1.2 0 0 2.1-.5 2.4-3.8-1.5-.7-2.7-1.7-2.8-1.7-.4-.3-.5-1-.2-1.4.3-.4 1-.5 1.4-.2 0 0 1.5 1.2 2.9 1.7.4.1.7.5.7.9 0 5.6-3.8 6.4-4 6.5h-.2Z" class="cls-ThreatSuppression1"/><path d="M21.3 25.8h-.2c-.2 0-4-.9-4-6.5s.3-.8.7-.9c1.2-.4 2.5-1.3 2.9-1.7.4-.3 1.1-.3 1.4.2.3.4.3 1.1-.2 1.4 0 0-1.3 1.1-2.8 1.7.2 3.3 2.3 3.8 2.4 3.8.5.1.9.7.8 1.2-.1.5-.5.8-1 .8ZM8.1 34c-.3 0-.5 0-.7-.3-.4-.4-.4-1 0-1.4l8.1-8.1c.4-.4 1-.4 1.4 0s.4 1 0 1.4l-8.1 8.1c-.2.2-.5.3-.7.3Z" class="cls-ThreatSuppression1"/><path d="M16.3 32c-.6 0-1-.4-1-1v-5.1h-5.1c-.6 0-1-.4-1-1s.4-1 1-1h6.1c.6 0 1 .4 1 1V31c0 .6-.4 1-1 1ZM26 17c-.3 0-.5 0-.7-.3-.4-.4-.4-1 0-1.4l8.1-8.1c.4-.4 1-.4 1.4 0s.4 1 0 1.4l-8.1 8.1c-.2.2-.5.3-.7.3Z" class="cls-ThreatSuppression1"/><path d="M31.8 17.3h-6.1c-.6 0-1-.4-1-1v-6.1c0-.6.4-1 1-1s1 .4 1 1v5.1h5.1c.6 0 1 .4 1 1s-.4 1-1 1ZM21 42c-.6 0-1-.4-1-1v-4c0-.6.4-1 1-1s1 .4 1 1v4c0 .6-.4 1-1 1ZM21 6c-.6 0-1-.4-1-1V1c0-.6.4-1 1-1s1 .4 1 1v4c0 .6-.4 1-1 1ZM41 22h-4c-.6 0-1-.4-1-1s.4-1 1-1h4c.6 0 1 .4 1 1s-.4 1-1 1ZM5 22H1c-.6 0-1-.4-1-1s.4-1 1-1h4c.6 0 1 .4 1 1s-.4 1-1 1Z" class="cls-ThreatSuppression1"/><path d="M6.6 28.1c-.4 0-.8-.2-.9-.6-.9-2-1.3-4.2-1.3-6.5 0-9.2 7.5-16.7 16.7-16.7s4.4.4 6.5 1.3c.5.2.7.8.5 1.3s-.8.7-1.3.5c-1.8-.8-3.7-1.1-5.7-1.1C13 6.3 6.4 12.9 6.4 21s.4 3.9 1.1 5.7c.2.5 0 1.1-.5 1.3h-.4ZM21 37.7c-2.2 0-4.4-.4-6.5-1.3-.5-.2-.7-.8-.5-1.3.2-.5.8-.7 1.3-.5 1.8.8 3.7 1.1 5.7 1.1 8.1 0 14.7-6.6 14.7-14.7s-.3-3.3-.8-4.9c-.2-.5 0-1.1.6-1.3.5-.2 1.1 0 1.3.6.6 1.8.9 3.6.9 5.6 0 9.2-7.5 16.7-16.7 16.7Z" class="cls-ThreatSuppression1"/><path d="M12.3 21.1c-.6 0-1-.4-1-1 0-2.5 1.1-4.9 2.9-6.6 1.6-1.4 3.7-2.2 5.9-2.2s1 .4 1 1-.4 1-1 1c-1.7 0-3.3.6-4.6 1.7-1.4 1.3-2.3 3.1-2.3 5.1s-.4 1-1 1ZM21.9 30.7c-.6 0-1-.4-1-1s.4-1 1-1c2.3 0 4.4-1.1 5.7-3 .8-1.1 1.1-2.4 1.1-3.8s.4-1 1-1 1 .4 1 1c0 1.8-.5 3.5-1.5 4.9-1.6 2.5-4.4 3.9-7.3 3.9Z" class="cls-ThreatSuppression1"/></g></svg> <h3>Threat Suppression</h3> </div> <div class="UseCaseDrawers__DrawerTopIcon" data-use-case-drawer="8"> <svg xmlns="http://www.w3.org/2000/svg" width="33.019" height="33.019"><defs><clipPath id="a"><path fill="#a8b1d3" d="M0 0h33.019v33.019H0z" data-name="Rectangle 625"/></clipPath></defs><g data-name="Group 1511"><g fill="#a8b1d3" clip-path="url(#a)" data-name="Group 1510"><path d="M16.51 33.019A16.51 16.51 0 1 1 33.021 16.51 16.529 16.529 0 0 1 16.51 33.019m0-29.911a13.4 13.4 0 1 0 13.4 13.4 13.417 13.417 0 0 0-13.4-13.4" data-name="Path 3029"/><path d="M16.51 25.856a1.555 1.555 0 0 1-1.554-1.554V8.72a1.554 1.554 0 1 1 3.109 0v15.578a1.555 1.555 0 0 1-1.555 1.558" data-name="Path 3030"/><path d="M24.298 18.066H8.72a1.554 1.554 0 1 1 0-3.109h15.578a1.554 1.554 0 1 1 0 3.109" data-name="Path 3031"/></g></g></svg> <svg xmlns="http://www.w3.org/2000/svg" width="33.019" height="33.019"><defs><clipPath id="a"><path fill="#a8b1d3" d="M0 0h33.019v33.019H0z" data-name="Rectangle 625"/></clipPath></defs><g data-name="Group 1719"><g fill="#a8b1d3" clip-path="url(#a)" data-name="Group 1510"><path d="M16.51 33.019A16.51 16.51 0 1 1 33.021 16.51 16.529 16.529 0 0 1 16.51 33.019m0-29.911a13.4 13.4 0 1 0 13.4 13.4 13.417 13.417 0 0 0-13.4-13.4" data-name="Path 3029"/><path d="M24.298 18.066H8.72a1.554 1.554 0 1 1 0-3.109h15.578a1.554 1.554 0 1 1 0 3.109" data-name="Path 3031"/></g></g></svg> </div> </div> <div class="UseCaseDrawers__DrawerBottom"> <div class="UseCaseDrawers__DrawerBottomCopy"> <p>We will use our proprietary forensic technology, the eSentire Agent, to rapidly isolate the host devices identified as at risk of further compromise, and those that could be leveraged by an attacker to expand to other parts of the network. Once enabled, our host isolation technology ensures the threat cannot expand, move laterally, communicate with remote servers, or continue to exfiltrate data. Once isolation is enabled, the threat is effectively stopped in its tracks.</p> </div> </div> </div> <div class="UseCaseDrawers__DrawerConnector"></div> <div class="UseCaseDrawers__Drawer" data-use-case-drawer="9"> <div class="UseCaseDrawers__DrawerTop"> <div class="UseCaseDrawers__DrawerTopHeadingIcon"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 33.3 42"><defs><style>.cls-RemediationReco1{fill:#19234d}</style></defs><g id="Layer_1"><path d="M7 15.9c-1 0-1.9-.8-1.9-1.9s.8-1.9 1.9-1.9 1.9.8 1.9 1.9-.8 1.9-1.9 1.9Zm0-2s-.1 0-.1.1.3.1.3 0 0-.1-.1-.1ZM7 22.9c-1 0-1.9-.8-1.9-1.9s.8-1.9 1.9-1.9 1.9.8 1.9 1.9-.8 1.9-1.9 1.9Zm0-2s-.1 0-.1.1.3.1.3 0 0-.1-.1-.1Z" class="cls-RemediationReco1"/><path d="M17.5 42H1c-.6 0-1-.4-1-1V3.6c0-.6.4-1 1-1h7.2c.6 0 1 .4 1 1s-.4 1-1 1H2V40h15.5c.6 0 1 .4 1 1s-.4 1-1 1ZM30.6 27.2c-.6 0-1-.4-1-1V4.6h-6.2c-.6 0-1-.4-1-1s.4-1 1-1h7.2c.6 0 1 .4 1 1v22.6c0 .6-.4 1-1 1Z" class="cls-RemediationReco1"/><path d="M20 7.2h-8.3c-2.1 0-3.8-1.6-3.8-3.6V1c0-.6.4-1 1-1s1 .4 1 1v2.6c0 .9.8 1.6 1.8 1.6H20c1 0 1.8-.7 1.8-1.6V1c0-.6.4-1 1-1s1 .4 1 1v2.6c0 2-1.7 3.6-3.8 3.6Z" class="cls-RemediationReco1"/><path d="M22.7 2H8.8c-.6 0-1-.4-1-1s.4-1 1-1h13.9c.6 0 1 .4 1 1s-.4 1-1 1ZM25.3 15H13.1c-.6 0-1-.4-1-1s.4-1 1-1h12.2c.6 0 1 .4 1 1s-.4 1-1 1ZM25.3 22H13.1c-.6 0-1-.4-1-1s.4-1 1-1h12.2c.6 0 1 .4 1 1s-.4 1-1 1ZM7 29.8c-1 0-1.9-.8-1.9-1.9S5.9 26 7 26s1.9.8 1.9 1.9-.8 1.9-1.9 1.9Zm0-2s-.1 0-.1.1.3.1.3 0 0-.1-.1-.1ZM25.3 29H13.1c-.6 0-1-.4-1-1s.4-1 1-1h12.2c.6 0 1 .4 1 1s-.4 1-1 1ZM23.7 42c-.3 0-.6-.2-.8-.4l-3.6-5.1c-.3-.5-.2-1.1.2-1.4.5-.3 1.1-.2 1.4.2l2.8 4 7.7-9.4c.4-.4 1-.5 1.4-.1s.5 1 .1 1.4l-8.6 10.4c-.2.2-.5.4-.8.4Z" class="cls-RemediationReco1"/></g></svg> <h3>Remediation and Recommendations</h3> </div> <div class="UseCaseDrawers__DrawerTopIcon" data-use-case-drawer="9"> <svg xmlns="http://www.w3.org/2000/svg" width="33.019" height="33.019"><defs><clipPath id="a"><path fill="#a8b1d3" d="M0 0h33.019v33.019H0z" data-name="Rectangle 625"/></clipPath></defs><g data-name="Group 1511"><g fill="#a8b1d3" clip-path="url(#a)" data-name="Group 1510"><path d="M16.51 33.019A16.51 16.51 0 1 1 33.021 16.51 16.529 16.529 0 0 1 16.51 33.019m0-29.911a13.4 13.4 0 1 0 13.4 13.4 13.417 13.417 0 0 0-13.4-13.4" data-name="Path 3029"/><path d="M16.51 25.856a1.555 1.555 0 0 1-1.554-1.554V8.72a1.554 1.554 0 1 1 3.109 0v15.578a1.555 1.555 0 0 1-1.555 1.558" data-name="Path 3030"/><path d="M24.298 18.066H8.72a1.554 1.554 0 1 1 0-3.109h15.578a1.554 1.554 0 1 1 0 3.109" data-name="Path 3031"/></g></g></svg> <svg xmlns="http://www.w3.org/2000/svg" width="33.019" height="33.019"><defs><clipPath id="a"><path fill="#a8b1d3" d="M0 0h33.019v33.019H0z" data-name="Rectangle 625"/></clipPath></defs><g data-name="Group 1719"><g fill="#a8b1d3" clip-path="url(#a)" data-name="Group 1510"><path d="M16.51 33.019A16.51 16.51 0 1 1 33.021 16.51 16.529 16.529 0 0 1 16.51 33.019m0-29.911a13.4 13.4 0 1 0 13.4 13.4 13.417 13.417 0 0 0-13.4-13.4" data-name="Path 3029"/><path d="M24.298 18.066H8.72a1.554 1.554 0 1 1 0-3.109h15.578a1.554 1.554 0 1 1 0 3.109" data-name="Path 3031"/></g></g></svg> </div> </div> <div class="UseCaseDrawers__DrawerBottom"> <div class="UseCaseDrawers__DrawerBottomCopy"> <p>eSentire will work with you to build effective remediation strategies. eSentire Responders will leverage their specialized knowledge of attacker tactics and techniques, and their deep understanding of modern malware, to advise you of best practices to consider when remediating the network. We also will provide recommendations that directly address security gaps identified throughout the course of the investigation.</p> </div> </div> </div> </div> </div> </section> <script> let UseCaseDrawerIcons = document.querySelectorAll('.UseCaseDrawers__DrawerTopIcon'); UseCaseDrawerIcons.forEach(UseCaseDrawerIcon => { UseCaseDrawerIcon.addEventListener('click', (e) => { document.querySelector(`.UseCaseDrawers__Drawer[data-use-case-drawer="${UseCaseDrawerIcon.getAttribute('data-use-case-drawer')}"]`).classList.toggle('selected'); }); }); </script> <section class="CompleteCyberV2"> <div class="CompleteCyberV2__Content"> <div class="CompleteCyberV2__ContentTop"> <h2>Complete Cyber Incident Response</h2> <p>We deliver cutting-edge digital forensics, industry-leading threat intelligence, and powerful 24/7 Incident Response services and expertise. With our On‑Demand 24/7 Incident Response retainer in place, you can be confident you’re prepared for the most advanced cyberattacks.</p> </div> <div class="CompleteCyberV2__ContentMiddle"> <div class="CompleteCyberV2__ContentMiddleBox"> <h3>Rapid Deployment</h3> <div class="CompleteCyberV2__ContentMiddleBoxCards"> <div class="CompleteCyberV2__ContentMiddleBoxCard"> <div class="CompleteCyberV2__ContentMiddleBoxCardTop"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 52.399 41.099"><defs><style>.cls-4HourRemote1{fill:#19234d}.cls-4HourRemote2{fill:#696de3}</style></defs><path d="M20.599 40.899h-2.1c-11.3-1.1-19.5-11.2-18.4-22.4 1.1-11.3 11.2-19.5 22.4-18.4 7.9.8 14.5 5.9 17.2 13.3.2.5 0 1.1-.6 1.3-.5.2-1.1 0-1.3-.6-2.5-6.7-8.4-11.3-15.6-12-10.1-1-19.2 6.4-20.2 16.6s6.4 19.2 16.6 20.2c2.9.3 5.8 0 8.5-1.1.5-.2 1.1 0 1.3.6.2.5 0 1.1-.6 1.3-2.4.9-4.8 1.4-7.3 1.4l.1-.2Z" class="cls-4HourRemote1"/><path d="m39.099 14.699-8.4-.8c-.5 0-1-.5-.9-1.1s.5-1 1.1-.9l7.4.7.7-7.4c0-.5.6-1 1.1-.9.5 0 1 .5.9 1.1l-.8 8.4c0 .3-.2.5-.4.7-.2.1-.4.2-.6.2h-.1Z" class="cls-4HourRemote1"/><path d="M20.799 20.499c-.6 0-1-.4-1-1v-11.9c0-.6.4-1 1-1s1 .4 1 1v11.9c0 .6-.4 1-1 1ZM19.099 22.199h-7.6c-.6 0-1-.4-1-1s.4-1 1-1h7.6c.6 0 1 .4 1 1s-.4 1-1 1Z" class="cls-4HourRemote2"/><path d="M20.799 23.899c-1.5 0-2.7-1.2-2.7-2.7s1.2-2.7 2.7-2.7 2.7 1.2 2.7 2.7-1.2 2.7-2.7 2.7Zm0-3.4c-.4 0-.7.3-.7.7s.3.7.7.7.7-.3.7-.7-.3-.7-.7-.7ZM38.099 34.999c-.6 0-1-.4-1-1v-2h-4.9c-.4 0-.7-.2-.9-.5s-.2-.7 0-1l5.9-8.9c.2-.4.7-.5 1.1-.4.4 0 .7.5.7 1v11.9c0 .6-.4 1-1 1h.1v-.1Zm-4.1-5h3.1v-4.6l-3.1 4.6ZM44.299 34.999c-.6 0-1-.4-1-1v-11.9c0-.6.4-1 1-1s1 .4 1 1v11.9c0 .6-.4 1-1 1Z" class="cls-4HourRemote2"/><path d="M51.399 28.999h-7.1c-.6 0-1-.4-1-1s.4-1 1-1h7.1c.6 0 1 .4 1 1s-.4 1-1 1Z" class="cls-4HourRemote2"/><path d="M51.399 34.999c-.6 0-1-.4-1-1v-11.9c0-.6.4-1 1-1s1 .4 1 1v11.9c0 .6-.4 1-1 1Z" class="cls-4HourRemote2"/></svg> <h4>4-Hour Remote SLA with Retainer </h4> </div> <p>Quickly mobilizes investigative toolset and expert responders providing critical visibility and support across your affected networks and assets.</p> </div> <div class="CompleteCyberV2__ContentMiddleBoxCard"> <div class="CompleteCyberV2__ContentMiddleBoxCardTop"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 48 44"><defs><style>.cls-OnSiteRes1{fill:#19234d}.cls-OnSiteRes2{fill:#696de3}</style></defs><path d="M45.5 44h-43C1.1 44 0 42.9 0 41.5V10.6c0-1.4 1.1-2.5 2.5-2.5h43c1.4 0 2.5 1.1 2.5 2.5v30.9c0 1.4-1.1 2.5-2.5 2.5Zm-43-34c-.3 0-.5.2-.5.5v30.9c0 .3.2.5.5.5h42.9c.3 0 .5-.2.5-.5V10.5c0-.3-.2-.5-.5-.5H2.5Z" class="cls-OnSiteRes1"/><path d="M32 10c-.6 0-1-.4-1-1V4.2C31 3 30 2 28.8 2h-9.6C18 2 17 3 17 4.2V9c0 .6-.4 1-1 1s-1-.4-1-1V4.2C15 1.9 16.9 0 19.2 0h9.6C31.1 0 33 1.9 33 4.2V9c0 .6-.4 1-1 1Z" class="cls-OnSiteRes1"/><path d="M24 35.3c-2.5 0-4.9-.9-6.8-2.8-3.7-3.7-3.7-9.8 0-13.5s9.8-3.7 13.5 0 3.7 9.8 0 13.5c-1.9 1.9-4.3 2.8-6.8 2.8h.1Zm0-17.2c-1.9 0-3.9.7-5.4 2.2-3 3-3 7.8 0 10.7 3 3 7.8 3 10.7 0 3-3 3-7.8 0-10.7-1.5-1.5-3.4-2.2-5.4-2.2h.1Z" class="cls-OnSiteRes2"/><path d="M28.1 26.7h-8.2c-.6 0-1-.4-1-1s.4-1 1-1h8.2c.6 0 1 .4 1 1s-.4 1-1 1Z" class="cls-OnSiteRes2"/><path d="M24 30.8c-.6 0-1-.4-1-1v-8.2c0-.6.4-1 1-1s1 .4 1 1v8.2c0 .6-.4 1-1 1Z" class="cls-OnSiteRes2"/></svg> <h4>On-Site Incident Responders</h4> </div> <p>Within 24 hours, we can deploy boots on the ground for on-site incident response management.</p> </div> <div class="CompleteCyberV2__ContentMiddleBoxCard"> <div class="CompleteCyberV2__ContentMiddleBoxCardTop"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 47.1 47.3"><defs><style>.cls-EndToEndMgmt1{fill:#19234d}.cls-EndToEndMgmt2{fill:#696de3}</style></defs><path d="M20.8 47.1c-.5 0-.9-.4-1-.8l-.8-5.4c-1.5-.4-2.9-1-4.3-1.7l-4.3 3.3c-.4.3-1 .3-1.3 0l-4.2-4.2c-.3-.3-.4-.9-.1-1.3L8 32.6c-.8-1.4-1.4-2.8-1.8-4.4l-5.3-.7c-.5 0-.9-.5-.9-1v-5.9c0-.5.3-.9.8-1l5.4-.8c.4-1.5 1-3 1.8-4.3l-3.3-4.2c-.3-.4-.3-1 0-1.3l4.2-4.2c.4-.4.9-.4 1.3 0l4.3 3.3c1.4-.8 2.8-1.4 4.3-1.8l.7-5.4c0-.5.5-.9 1-.9h5.9c.5 0 .9.4 1 .9l.8 5.4c1.5.4 2.9 1 4.2 1.7l4.4-3.3c.4-.3 1-.3 1.3 0l4.2 4.2c.4.4.4.9 0 1.3L39 14.5c.8 1.4 1.4 2.8 1.8 4.3l5.4.7c.5 0 .9.5.9 1v5.9c0 .6-.4 1-1 1s-1-.4-1-1v-5l-5.2-.7c-.4 0-.8-.4-.8-.8-.4-1.8-1.1-3.4-2.1-5-.2-.4-.2-.8 0-1.1l3.2-4.2-3-2.9L33 9.9c-.3.3-.8.3-1.1 0-1.5-.9-3.2-1.6-4.9-2-.4 0-.7-.4-.8-.8l-.8-5.3h-4.2L20.5 7c0 .4-.4.8-.8.8-1.7.4-3.4 1.1-5 2.1-.4.2-.8.2-1.1 0L9.4 6.7l-2.9 3 3.2 4.1c.3.3.3.8 0 1.2-1 1.5-1.7 3.2-2.1 5 0 .4-.4.7-.8.8l-5.2.8v4.2l5.1.6c.4 0 .8.4.9.8.4 1.8 1.1 3.5 2.1 5 .2.3.2.8 0 1.1l-3.1 4.2 3 3 4.2-3.1c.3-.2.8-.3 1.1 0 1.5 1 3.2 1.6 4.9 2 .4 0 .7.4.8.8l.8 5.2h4.2l.7-5.2c0-.5.6-.9 1.1-.9s.9.6.9 1.1l-.8 6c0 .5-.5.9-1 .9h-5.9l.2-.2Z" class="cls-EndToEndMgmt1"/><path d="M23.7 34.6c-6.2 0-11.2-5-11.2-11.2s5-11.2 11.2-11.2 11.2 5 11.2 11.2-5 11.2-11.2 11.2Zm0-20.4c-5.1 0-9.2 4.1-9.2 9.2s4.1 9.2 9.2 9.2 9.2-4.1 9.2-9.2-4.1-9.2-9.2-9.2Z" class="cls-EndToEndMgmt1"/><path d="M40.5 38c-.6 0-1-.4-1-1v-4.8c0-.6.4-1 1-1s1 .4 1 1V37c0 .6-.4 1-1 1Z" class="cls-EndToEndMgmt2"/><path d="M49.6 43.9H31.4c-.4 0-.7-.2-.9-.5s-.2-.7 0-1l9.1-16.6c.4-.6 1.4-.6 1.8 0l9.1 16.6c.2.3.2.7 0 1s-.5.5-.9.5Zm-16.5-2h14.8l-7.4-13.5-7.4 13.5Z" class="cls-EndToEndMgmt2"/><path d="M40.5 41.5c-.8 0-1.4-.6-1.4-1.4s.6-1.4 1.4-1.4 1.4.6 1.4 1.4-.6 1.4-1.4 1.4Z" class="cls-EndToEndMgmt2"/></svg> <h4>End-to-End Incident Management</h4> </div> <p>Cyber Security Investigations team and supporting technologies cover the full incident response lifecycle.</p> </div> <div class="CompleteCyberV2__ContentMiddleBoxCard"> <div class="CompleteCyberV2__ContentMiddleBoxCardTop"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 48 44"><defs><style>.cls-ToolSets1{fill:#19234d}</style></defs><path d="M45.5 44h-43C1.1 44 0 42.9 0 41.5V10.6c0-1.4 1.1-2.5 2.5-2.5h43c1.4 0 2.5 1.1 2.5 2.5v30.9c0 1.4-1.1 2.5-2.5 2.5Zm-43-34c-.3 0-.5.2-.5.5v30.9c0 .3.2.5.5.5h42.9c.3 0 .5-.2.5-.5V10.5c0-.3-.2-.5-.5-.5H2.5Z" class="cls-ToolSets1"/><path d="M42.2 10c-.6 0-1-.4-1-1V4.2C41.2 3 40.2 2 39 2H9C7.8 2 6.8 3 6.8 4.2V9c0 .6-.4 1-1 1s-1-.4-1-1V4.2C4.8 1.9 6.7 0 9 0h30c2.3 0 4.2 1.9 4.2 4.2V9c0 .6-.4 1-1 1ZM47 20H1c-.6 0-1-.4-1-1s.4-1 1-1h46c.6 0 1 .4 1 1s-.4 1-1 1Z" class="cls-ToolSets1"/><path d="M13.8 37c-2 0-3.9-1.3-4.9-3.3-.2-.3-.1-.7 0-1 .2-.3.5-.5.9-.5h2.6v-2.6H9.8c-.3 0-.7-.2-.9-.5-.2-.3-.2-.7 0-1 1-2 2.9-3.2 5-3.2s3.5 1 4.3 2.7H30c.8-1.8 2.3-2.7 4.3-2.7 2.1 0 4 1.3 5 3.2.2.3.1.7 0 1-.2.3-.5.5-.9.5h-2.6v2.6h2.6c.3 0 .7.2.9.5s.2.7 0 1c-1 1.9-3.1 3.2-5.2 3.2-1.8 0-3.3-1-4.1-2.8H18.2c-.8 1.8-2.4 2.9-4.3 2.9h-.1Zm-2-2.8c.5.4 1.2.8 2 .8 1.7 0 2.4-1.3 2.6-2.1.1-.4.5-.7 1-.7h13.2c.4 0 .8.3 1 .7.2.8.9 2.1 2.5 2.1.7 0 1.4-.3 2.1-.7h-1.5c-.6 0-1-.4-1-1v-4.6c0-.6.4-1 1-1h1.5c-.6-.4-1.3-.7-2-.7-1.3 0-2.2.6-2.6 2-.1.4-.5.7-1 .7H17.4c-.4 0-.8-.3-1-.7-.4-1.4-1.3-2-2.6-2s-1.4.2-2 .7h1.6c.6 0 1 .4 1 1v4.6c0 .6-.4 1-1 1h-1.6v-.1Z" style="fill:#696de3"/></svg> <h4>Elite Tool Sets</h4> </div> <p>To illuminate where attackers are present. Supports root cause analysis.</p> </div> </div> </div> <div class="CompleteCyberV2__ContentMiddleBox"> <h3>Containment and Analysis</h3> <div class="CompleteCyberV2__ContentMiddleBoxCards"> <div class="CompleteCyberV2__ContentMiddleBoxCard"> <div class="CompleteCyberV2__ContentMiddleBoxCardTop"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 47.1 47.1"><defs><style>.cls-ManaContainment1{fill:#19234d}.cls-ManaContainment2{fill:#696de3}</style></defs><path d="M45.3 47H1.7C.8 47 0 46.3 0 45.3V1.7C0 .8.7 0 1.7 0h43.7c.9 0 1.7.7 1.7 1.7v43.7c0 .9-.8 1.7-1.7 1.7l-.1-.1ZM2 45h43V2H2v43ZM45.3 2Z" class="cls-ManaContainment1"/><path d="M13.8 44c-.6 0-1-.4-1-1v-8.8H4c-.6 0-1-.4-1-1s.4-1 1-1h9.8c.6 0 1 .4 1 1V43c0 .6-.4 1-1 1Z" class="cls-ManaContainment1"/><path d="M1.6 46.4c-.3 0-.5 0-.7-.3-.4-.4-.4-1 0-1.4l11.6-11.6c.4-.4 1-.4 1.4 0s.4 1 0 1.4L2.3 46.1c-.2.2-.5.3-.7.3ZM43 14.8h-9.8c-.6 0-1-.4-1-1V4c0-.6.4-1 1-1s1 .4 1 1v8.8H43c.6 0 1 .4 1 1s-.4 1-1 1Z" class="cls-ManaContainment1"/><path d="M33.8 14.2c-.3 0-.5 0-.7-.3-.4-.4-.4-1 0-1.4L44.7.9c.4-.4 1-.4 1.4 0s.4 1 0 1.4L34.5 13.9c-.2.2-.5.3-.7.3Z" class="cls-ManaContainment1"/><path d="M18 28.2c-5.2 0-9.5-4.3-9.5-9.5s4.3-9.5 9.5-9.5 9.5 4.3 9.5 9.5-4.3 9.5-9.5 9.5Zm0-17.1c-4.1 0-7.5 3.4-7.5 7.5s3.4 7.5 7.5 7.5 7.5-3.4 7.5-7.5-3.4-7.5-7.5-7.5Z" class="cls-ManaContainment2"/><path d="M25.9 27.5c-.3 0-.5 0-.7-.3l-1.8-1.8c-.4-.4-.4-1 0-1.4s1-.4 1.4 0l1.8 1.8c.4.4.4 1 0 1.4s-.5.3-.7.3Z" class="cls-ManaContainment2"/><path d="M34.7 39.1c-1 0-1.9-.4-2.7-1.1s0 0-.1-.1l-6.5-6.5c-1.5-1.5-1.5-3.9 0-5.4s3.9-1.5 5.4 0l6.6 6.6c1.5 1.5 1.5 3.9 0 5.4s-1.7 1.1-2.7 1.1Zm-1.2-2.4c.7.6 1.8.6 2.4 0 .7-.7.7-1.8 0-2.5l-6.6-6.6c-.7-.7-1.8-.7-2.5 0s-.7 1.8 0 2.5l6.6 6.6v.1l.1-.1Z" class="cls-ManaContainment2"/></svg> <h4>Managed Containment</h4> </div> <p>Locks down and isolates threat actors preventing further spread and business impact.</p> </div> <div class="CompleteCyberV2__ContentMiddleBoxCard"> <div class="CompleteCyberV2__ContentMiddleBoxCardTop"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 52.041 52.119"><defs><style>.cls-eradiSupp1{fill:#19234d}</style></defs><path d="M14 31.419c-.3 0-.5 0-.7-.3l-5.8-5.8-5.8 5.8c-.4.4-1 .4-1.4 0s-.4-1 0-1.4l6.6-6.6c.2-.2.4-.3.7-.3.3 0 .5.1.7.3l6.5 6.5c.4.4.4 1 0 1.4-.2.2-.5.3-.7.3l-.1.1Z" class="cls-eradiSupp1"/><path d="M28.5 50.019c-12.2 0-22.1-9.8-22.1-21.9v-3.9c0-.6.4-1 1-1s1 .4 1 1v3.9c0 11 9 19.9 20.1 19.9h.8c.5 0 1 .4 1 1s-.4 1-1 1h-.9.1ZM33.6 15.019c-.4 0-.8-.3-1-.7-.1-.5.2-1.1.7-1.2l8.9-2.5-2.4-9.4c-.1-.5.2-1.1.7-1.2.5-.1 1.1.2 1.2.7l2.6 10.3c.1.5-.2 1.1-.7 1.2l-9.8 2.8h-.3.1Z" class="cls-eradiSupp1"/><path d="m11 17.719-.9-.4-.8-.6c.1-.2.3-.4.4-.7 6-10.2 19.5-13.7 29.9-7.8l3.6 2c.5.3.7.9.4 1.4s-.9.7-1.4.4l-3.6-2c-9.5-5.4-21.7-2.2-27.2 7.1-.1.2-.2.4-.4.6Zm-.9-.4ZM46.7 52.119h-.3l-9.8-2.8c-.5-.1-.8-.7-.7-1.2l2.6-10.3c.1-.5.7-.9 1.2-.7.5.1.9.7.7 1.2l-2.4 9.4 8.9 2.5c.5.2.8.7.7 1.2-.1.4-.5.7-1 .7h.1Z" class="cls-eradiSupp1"/><path d="M37 48.819c-.3 0-.7-.2-.9-.5-.3-.5-.1-1.1.4-1.4l3.6-2.1c4.6-2.7 7.9-6.9 9.3-12.1 1.4-5.1.7-10.5-2-15.1l-.6-1 1.7-1 .6 1c2.9 5.1 3.7 11 2.2 16.6-1.5 5.7-5.1 10.4-10.2 13.3l-3.6 2.1c-.2 0-.3.1-.5.1v.1Z" class="cls-eradiSupp1"/><path d="M26.6 35.219c-.3 0-.6-.1-.8-.4l-4.9-5.9c-.4-.4-.3-1.1.1-1.4.4-.4 1.1-.3 1.4.1l4.2 5 10.4-11.8c.4-.4 1-.5 1.4 0 .4.4.5 1 0 1.4l-11.2 12.7c-.2.2-.5.3-.8.3h.2Z" style="fill:#696de3"/></svg> <h4>Eradication Support </h4> </div> <p>Identifies exploited vulnerabilities, supports remediation of affected assets. </p> </div> <div class="CompleteCyberV2__ContentMiddleBoxCard"> <div class="CompleteCyberV2__ContentMiddleBoxCardTop"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 44 44"><defs><style>.cls-DigitalFor1{fill:#19234d}.cls-DigitalFor2{fill:#696de3}</style></defs><path d="M33.8 35.4h-.2c-.5 0-.9-.6-.8-1.2 0 0 .5-3.2.7-6.2.4-5.2-.4-9.7-1-11.2-.2-.5 0-1.1.5-1.3.5-.2 1.1 0 1.3.5.8 2 1.5 6.9 1.2 12.1-.2 3.1-.7 6.3-.8 6.4 0 .5-.5.8-1 .8l.1.1ZM31.9 14.8c-.3 0-.6-.1-.8-.4-2.2-3.1-5.9-5-9.7-5s-3.9.4-5.6 1.3c-.5.2-1.1 0-1.3-.4-.2-.5 0-1.1.4-1.3 2-1 4.2-1.5 6.5-1.5 4.4 0 8.6 2.2 11.3 5.8.3.4.2 1.1-.2 1.4-.2.1-.4.2-.6.2v-.1ZM8.7 35.9h-.3c-.5-.2-.8-.7-.6-1.3 1.7-5.3 1.5-8.4 1.3-10.9v-2.1c0-5.2.5-8 3.1-10.7.4-.4 1-.4 1.4 0s.4 1 0 1.4c-2 2-2.5 3.9-2.5 9.2v2c.2 2.7.4 6-1.4 11.6-.1.4-.5.7-1 .7v.1Z" class="cls-DigitalFor2"/><path d="M29.3 39h-.2c-.5-.1-.9-.7-.8-1.2 1.1-5 1.4-7.8 1.5-9.8.1-3.5.2-5-.6-8-.4-1.4-2.1-6.1-7.3-6.2-.6 0-1-.5-1-1s.5-1 1-1c4.4.1 7.9 3 9.2 7.7.9 3.2.8 5 .7 8.5-.1 3-.6 6.1-1.5 10.2-.1.5-.5.8-1 .8ZM14.1 25c-.4 0-.8-.3-1-.7 0-.1-.2-.8-.3-2.7-.2-5.2 1.6-8.1 5.7-9.5.5-.2 1.1.1 1.3.6s-.1 1.1-.6 1.3c-2.7.9-4.5 2.5-4.3 7.5 0 1.7.2 2.2.2 2.2.1.5-.2 1.1-.7 1.2h-.3v.1ZM12.2 38.8h-.4c-.5-.2-.8-.8-.6-1.3 1.2-3.1 1.6-5 1.7-5.8.4-2.8.3-4.6.3-4.6 0-.6.4-1 1-1 .5 0 1 .4 1 1 0 0 0 2-.4 4.9-.1.8-.5 3-1.8 6.2-.2.4-.5.6-.9.6h.1Z" class="cls-DigitalFor2"/><path d="M24.8 40.2h-.4c-.5-.2-.8-.8-.6-1.3.9-2.3 1.5-6.4 1.6-7 .5-4.5.4-6.8-.2-9.6-.2-1.2-.7-2.2-1.2-2.8-.4-.4-.3-1.1.1-1.4.4-.4 1.1-.3 1.4.1.8.9 1.3 2.2 1.6 3.7.6 3 .7 5.5.2 10.2 0 .7-.8 5-1.7 7.5-.2.4-.5.6-.9.6h.1ZM16.1 39.7h-.4c-.5-.2-.7-.8-.5-1.3.7-1.6 2.2-5.3 2.2-9s-.2-3.8-.4-4.6c-.1-.8-.3-1.5-.3-3.1 0-3.3 1.8-5.5 4.7-5.5s.9 0 1.3.2c.5.2.7.8.5 1.3s-.8.7-1.3.5h-.4c-2.3 0-2.7 2.2-2.7 3.5s.1 2.1.3 2.8c.2.9.4 2 .4 5s-1.7 8-2.4 9.7c-.2.4-.5.6-.9.6l-.1-.1Z" class="cls-DigitalFor2"/><path d="M22.4 28.7c-.6 0-1-.4-1-1 0-3.9-.6-5.8-.6-5.8-.2-.5.1-1.1.6-1.3s1.1.1 1.3.6c0 0 .7 2.2.7 6.4s-.4 1-1 1v.1ZM20.5 40.5c-.2 0-.3 0-.5-.1-.5-.3-.7-.9-.4-1.4 0 0 1.6-3 1.7-8.1 0-.6.5-1 1-1 .6 0 1 .5 1 1-.2 5.6-1.9 8.8-2 9-.2.3-.5.5-.9.5l.1.1ZM38.4 25.6c-.6 0-1-.4-1-1v-2.2c0-4.2-.9-9.9-5.4-13.2-.4-.3-.5-1-.2-1.4s1-.5 1.4-.2c4.1 3 6.2 8.1 6.2 14.8v2.2c0 .6-.4 1-1 1ZM6.3 17.9h-.1c-.5 0-.9-.6-.9-1.1.2-1.8.6-3.3 1.1-4.4 2.7-5.9 7.8-8.9 15.1-8.9s6.6.8 9.3 2.4c.5.3.6.9.4 1.4-.3.5-.9.6-1.4.4-2.4-1.4-5.2-2.1-8.3-2.1-6.4 0-10.9 2.6-13.3 7.7-.5 1-.8 2.3-1 3.8 0 .5-.5.9-1 .9l.1-.1ZM5.7 31.7h-.2c-.5-.1-.9-.6-.8-1.2.5-2.3.6-4.4.5-6.5 0-1.6-.1-2.9-.1-4.2 0-.6.5-1 1-1 .6 0 1 .5 1 1 0 1.2 0 2.5.1 4 .1 2.3 0 4.5-.5 7 0 .5-.5.8-1 .8v.1Z" class="cls-DigitalFor2"/><path d="M1 11.1c-.6 0-1-.4-1-1V1c0-.6.4-1 1-1h9.1c.6 0 1 .4 1 1s-.4 1-1 1H2v8.1c0 .6-.4 1-1 1ZM43 11.1c-.6 0-1-.4-1-1V2h-8.1c-.6 0-1-.4-1-1s.4-1 1-1H43c.6 0 1 .4 1 1v9.1c0 .6-.4 1-1 1ZM43 44h-9.1c-.6 0-1-.4-1-1s.4-1 1-1H42v-8.1c0-.6.4-1 1-1s1 .4 1 1V43c0 .6-.4 1-1 1ZM10.2 44H1.1c-.6 0-1-.4-1-1v-9.1c0-.6.4-1 1-1s1 .4 1 1V42h8.1c.6 0 1 .4 1 1s-.4 1-1 1Z" class="cls-DigitalFor1"/></svg> <h4>Digital Forensic Analysis</h4> </div> <p>Reconstructs the incident determining root cause, affected systems and attacker pathways.</p> </div> <div class="CompleteCyberV2__ContentMiddleBoxCard"> <div class="CompleteCyberV2__ContentMiddleBoxCardTop"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 47.795 52.6"><defs><style>.cls-AssetHand1{fill:#19234d}.cls-AssetHand2{fill:#696de3}</style></defs><path d="M31.619 46.6c-.5 0-1.1-.1-1.6-.3l-11.4-3.7c-.5-.2-.8-.7-.6-1.3s.7-.8 1.3-.6l11.5 3.7h.1c.5.2 1 .2 1.5 0s.9-.6 1.2-1.2c.5-1.1 0-2.4-1.1-2.9-.5-.2-.7-.8-.5-1.3s.8-.7 1.3-.5c2 .9 3 3.4 2.1 5.5-.4 1.1-1.2 1.9-2.3 2.3-.5.2-1 .3-1.5.3Z" class="cls-AssetHand1"/><path d="M32.719 52.6c-.3 0-6.4-.1-10.2-1.4-1.2-.4-2.7-.9-4.1-1.5-2.6-.9-5.8-2.1-6.7-2.1s-5.7 1.2-8.3 2c-.3 0-.6 0-.8-.1s-.4-.4-.5-.7l-2.1-10.2c-.1-.5.2-1 .7-1.2 13.2-3.6 20-2.8 20.3-2.8h.2l11.9 3.8c.5.2.8.7.6 1.3-.2.5-.7.8-1.3.6l-11.8-3.8c-.8 0-7.1-.5-18.6 2.5l1.7 8.2c2.1-.6 6.5-1.7 7.8-1.7s3.6.8 7.4 2.2c1.4.5 2.9 1.1 4.1 1.5 3.1 1 8.2 1.3 9.4 1.3l12-6.7c1.1-.5 1.6-1.8 1.2-2.9-.2-.6-.6-1-1.1-1.2s-1-.2-1.5 0-1.1 0-1.3-.5 0-1.1.5-1.3c1-.4 2.1-.4 3.1 0s1.8 1.3 2.2 2.3c.8 2.1-.2 4.5-2.2 5.4l-12.2 6.8c-.1 0-.3.1-.5.1l.1.1Z" class="cls-AssetHand1"/><path d="M34.619 43.9c-.4 0-.7-.2-.9-.5-.3-.5 0-1.1.4-1.3l8-4.1c.5-.3 1.1 0 1.3.4.3.5 0 1.1-.4 1.3l-8 4.1c-.1 0-.3.1-.5.1h.1Z" class="cls-AssetHand1"/><path d="M28.819 23.8c-4 0-7.3-3.3-7.3-7.3s3.3-7.3 7.3-7.3 7.3 3.3 7.3 7.3-3.3 7.3-7.3 7.3Zm0-12.5c-2.9 0-5.3 2.4-5.3 5.3s2.4 5.3 5.3 5.3 5.3-2.4 5.3-5.3-2.4-5.3-5.3-5.3Z" class="cls-AssetHand2"/><path d="M31.019 33.6h-4.2c-.5 0-.9-.4-1-.8l-.6-3.6c-.9-.3-1.8-.6-2.7-1.1l-2.9 2.2c-.4.3-1 .3-1.3 0l-3-2.9c-.4-.3-.4-.9-.1-1.3l2.1-2.9c-.5-.9-.9-1.8-1.2-2.8l-3.5-.4c-.5 0-.9-.5-.9-1v-4.2c0-.5.4-.9.9-1l3.6-.5c.3-1 .7-1.9 1.2-2.8l-2.2-2.8c-.3-.4-.3-1 0-1.3l2.9-3c.4-.4.9-.4 1.3 0l2.9 2.2c.9-.5 1.8-.9 2.8-1.1l.5-3.6c0-.5.5-.9 1-.9h4.2c.5 0 .9.4 1 .9l.5 3.6c.9.3 1.8.6 2.7 1.1l2.9-2.2c.4-.3 1-.3 1.3 0l3 2.9c.4.4.4.9 0 1.3l-2.2 2.9c.5.9.9 1.8 1.2 2.8l3.6.5c.5 0 .9.5.9 1V19c0 .5-.4.9-.8 1l-3.6.6c-.3 1-.7 1.9-1.1 2.7l2.2 2.9c.3.4.3 1 0 1.3l-2.9 3c-.3.4-.9.4-1.3.1l-2.9-2.2c-.9.5-1.8.9-2.7 1.1l-.5 3.6c0 .5-.5.9-1 .9l-.1-.4Zm-3.3-2h2.4l.4-3.4c0-.4.4-.7.8-.8 1.2-.3 2.4-.8 3.4-1.4.3-.2.8-.2 1.1 0l2.8 2 1.7-1.7-2.1-2.7c-.3-.3-.3-.8 0-1.1.6-1 1.1-2.1 1.4-3.3 0-.4.4-.8.8-.9l3.4-.5v-2.4l-3.4-.4c-.4 0-.8-.4-.8-.8-.3-1.2-.8-2.4-1.4-3.4-.2-.4-.2-.8 0-1.1l2.1-2.8-1.7-1.7-2.8 2.1c-.3.3-.8.3-1.1 0-1.1-.7-2.2-1.1-3.4-1.4-.4 0-.7-.4-.8-.8l-.5-3.5h-2.4l-.4 3.4c0 .4-.4.8-.8.8-1.2.3-2.4.8-3.4 1.4-.4.2-.8.2-1.1 0l-2.7-2.1-1.7 1.7 2.1 2.7c.3.3.3.8 0 1.2-.7 1.1-1.2 2.2-1.4 3.4 0 .4-.4.7-.8.8l-3.4.5v2.4l3.4.4c.4 0 .8.4.9.8.3 1.2.7 2.4 1.4 3.4.2.3.2.8 0 1.1l-2 2.8 1.7 1.7 2.7-2.1c.3-.2.8-.3 1.1 0 1.1.7 2.2 1.1 3.4 1.4.4 0 .7.4.8.8l.5 3.4-.2.1Z" class="cls-AssetHand2"/></svg> <h4>Asset Handling</h4> </div> <p>Secure and robust processes for asset handling and chain of custody support.</p> </div> <div class="CompleteCyberV2__ContentMiddleBoxCard"> <div class="CompleteCyberV2__ContentMiddleBoxCardTop"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 48.072 48.2"><defs><style>.cls-MAnalysis1{fill:#19234d}.cls-MAnalysis2{fill:#696de3}</style></defs><path d="M18.019 16c-.2 0-.4 0-.5-.1-1.2-.7-2.5-2.3-2.5-4.1s1.2-5.8 9-5.8 9 3.6 9 5.8-1.3 3.3-2.5 4c-.5.3-1.1.2-1.4-.3-.3-.5-.2-1.1.3-1.4.8-.5 1.5-1.5 1.5-2.4 0-3.1-3.8-3.8-7-3.8s-7 .7-7 3.8.7 1.8 1.5 2.3c.5.3.6.9.3 1.4-.2.3-.5.5-.9.5l.2.1Z" class="cls-MAnalysis1"/><path d="M28.819 8.2h-.2c-.5-.1-.9-.7-.7-1.2 0-.4.1-.7.1-1 0-2.2-1.8-4-4-4s-4 1.8-4 4v.8c.1.5-.2 1.1-.8 1.2-.5.1-1.1-.2-1.2-.8 0-.4-.1-.8-.1-1.2 0-3.3 2.7-6 6-6s6 2.7 6 6 0 1-.2 1.5c-.1.5-.5.8-1 .8l.1-.1Zm10 18.8c-.5 0-.9-.4-1-.9-.7-5.1-3-9.3-6.7-11.7-.5-.3-.6-.9-.3-1.4s.9-.6 1.4-.3c4.1 2.8 6.8 7.5 7.5 13.1 0 .5-.3 1-.9 1.1h-.1l.1.1Zm-14.8 21c-4.4 0-16-8.6-16-19s2.9-13 7.8-16.3c.5-.3 1.1-.2 1.4.3s.2 1.1-.3 1.4c-4.3 3-6.9 8.4-6.9 14.7 0 9.4 10.6 17 14 17s2.4-.5 4.5-1.8c.5-.3 1.1-.2 1.4.3.3.5.2 1.1-.3 1.4-2.1 1.4-4.1 2.2-5.5 2.2l-.1-.2Z" class="cls-MAnalysis1"/><path d="M12.319 17.7h-.2l-8.2-1.9c-.3 0-.6-.3-.7-.6l-3.1-7.8c-.2-.5 0-1.1.6-1.3.5-.2 1.1 0 1.3.6l2.9 7.3 7.7 1.8c.5.1.9.7.7 1.2-.1.5-.5.8-1 .8v-.1ZM1.019 43h-.4c-.5-.2-.7-.8-.5-1.3l3.1-7.3c.1-.3.4-.5.7-.6l5.5-1.3c.5-.1 1.1.2 1.2.8s-.2 1.1-.8 1.2l-5 1.1-2.9 6.8c-.2.4-.5.6-.9.6Zm0-16c-.5 0-.9-.3-1-.8s.2-1.1.7-1.2l8.5-2c.5-.1 1.1.2 1.2.7s-.2 1.1-.7 1.2l-8.5 2h-.2v.1Zm34.7-9.3c-.5 0-.9-.3-1-.8s.2-1.1.7-1.2l7.7-1.8 2.9-7.3c.2-.5.8-.8 1.3-.6.5.2.8.8.6 1.3l-3.1 7.8c-.1.3-.4.5-.7.6l-8.2 1.9h-.2v.1Zm11.3 9.3h-.2l-8.5-2c-.5-.1-.9-.7-.7-1.2.1-.5.7-.9 1.2-.7l8.5 2c.5.1.9.7.7 1.2-.1.5-.5.8-1 .8V27Z" class="cls-MAnalysis1"/><path d="M38.019 45c-3.9 0-7-3.1-7-7s3.1-7 7-7 7 3.1 7 7-3.1 7-7 7Zm0-12c-2.8 0-5 2.2-5 5s2.2 5 5 5 5-2.2 5-5-2.2-5-5-5Z" class="cls-MAnalysis2"/><path d="M47.019 48c-.3 0-.5 0-.7-.3l-4.6-4.6c-.4-.4-.4-1 0-1.4s1-.4 1.4 0l4.6 4.6c.4.4.4 1 0 1.4s-.5.3-.7.3Z" class="cls-MAnalysis2"/></svg> <h4>Malware Analysis</h4> </div> <p>We will detect and analyze malicious files and URLs for suspicious activities to gather a deep analysis and generate comprehensive reports.</p> </div> <div class="CompleteCyberV2__ContentMiddleBoxCard"> <div class="CompleteCyberV2__ContentMiddleBoxCardTop"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 48 48.1"><defs><style>.cls-Confir1{fill:#19234d}.cls-Confir2{fill:#696de3}</style></defs><path d="M29 48H5c-2.8 0-5-2.2-5-5V5c0-2.8 2.2-5 5-5h32c2.8 0 5 2.2 5 5v19.9c0 .6-.4 1-1 1s-1-.4-1-1V5c0-1.7-1.3-3-3-3H5C3.3 2 2 3.3 2 5v38c0 1.7 1.3 3 3 3h24c.6 0 1 .4 1 1s-.4 1-1 1Z" class="cls-Confir1"/><path d="M41 17H1c-.6 0-1-.4-1-1s.4-1 1-1h40c.6 0 1 .4 1 1s-.4 1-1 1ZM11 8H7c-.6 0-1-.4-1-1s.4-1 1-1h4c.6 0 1 .4 1 1s-.4 1-1 1Zm0 15H7c-.6 0-1-.4-1-1s.4-1 1-1h4c.6 0 1 .4 1 1s-.4 1-1 1Zm0 16H7c-.6 0-1-.4-1-1s.4-1 1-1h4c.6 0 1 .4 1 1s-.4 1-1 1Zm17-6H1c-.6 0-1-.4-1-1s.4-1 1-1h27c.6 0 1 .4 1 1s-.4 1-1 1Z" class="cls-Confir1"/><path d="M40 48c-.5 0-.9-.3-1-.8s.2-1.1.8-1.2c.2 0 5.9-1.4 6.2-10.3-3.4-1.3-6.5-3.8-6.6-3.9-.4-.3-.5-1-.2-1.4s1-.5 1.4-.2c0 0 3.4 2.7 6.7 3.8.4.1.7.5.7.9 0 5.8-2.1 9-3.8 10.7-1.9 1.9-3.9 2.3-4 2.3H40v.1Z" class="cls-Confir2"/><path d="M40 48h-.2S32 46.3 32 35s.3-.8.7-.9c3.3-1.1 6.7-3.8 6.7-3.8.4-.3 1.1-.3 1.4.2.3.4.3 1.1-.2 1.4-.1.1-3.2 2.6-6.6 3.9.3 9 6.1 10.3 6.2 10.3.5.1.9.6.8 1.2 0 .5-.5.8-1 .8V48Z" class="cls-Confir2"/></svg> <h4>Confirmation</h4> </div> <p>Ensures the network is secure and monitors for attacker response and persistence measures.</p> </div> <div class="CompleteCyberV2__ContentMiddleBoxCard"> <div class="CompleteCyberV2__ContentMiddleBoxCardTop"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 50.5 50.5"><defs><style>.cls-CritiVisi1{fill:#19234d}.cls-CritiVisi2{fill:#696de3}</style></defs><path d="M3.2 49c-.3 0-.5 0-.7-.3-.4-.4-.4-1 0-1.4l9.9-9.9c.4-.4 1-.4 1.4 0s.4 1 0 1.4l-9.9 9.9c-.2.2-.5.3-.7.3Z" class="cls-CritiVisi1"/><path d="M10.6 49H3.1c-.6 0-1-.4-1-1v-7.5c0-.6.4-1 1-1s1 .4 1 1V47h6.5c.6 0 1 .4 1 1s-.4 1-1 1ZM37.5 15.2c-.3 0-.5 0-.7-.3-.4-.4-.4-1 0-1.4l9.9-9.9c.4-.4 1-.4 1.4 0s.4 1 0 1.4l-9.9 9.9c-.2.2-.5.3-.7.3Z" class="cls-CritiVisi1"/><path d="M47.7 12.4c-.6 0-1-.4-1-1V4.9h-6.5c-.6 0-1-.4-1-1s.4-1 1-1h7.5c.6 0 1 .4 1 1v7.5c0 .6-.4 1-1 1ZM25.2 50.5c-.6 0-1-.4-1-1v-4.8c0-.6.4-1 1-1s1 .4 1 1v4.8c0 .6-.4 1-1 1ZM25.2 6.8c-.6 0-1-.4-1-1V1c0-.6.4-1 1-1s1 .4 1 1v4.8c0 .6-.4 1-1 1ZM49.5 26.2h-4.9c-.6 0-1-.4-1-1s.4-1 1-1h4.9c.6 0 1 .4 1 1s-.4 1-1 1ZM5.8 26.2H1c-.6 0-1-.4-1-1s.4-1 1-1h4.8c.6 0 1 .4 1 1s-.4 1-1 1Z" class="cls-CritiVisi1"/><path d="M7.7 33.6c-.4 0-.8-.2-.9-.6-1-2.5-1.6-5.1-1.6-7.8 0-11 9-20 20-20s5.3.5 7.8 1.6c.5.2.7.8.5 1.3s-.8.7-1.3.5c-2.2-.9-4.6-1.4-7-1.4-9.9 0-18 8.1-18 18s.5 4.8 1.4 7c.2.5 0 1.1-.5 1.3h-.4v.1ZM25.2 45.2c-2.7 0-5.3-.5-7.8-1.6-.5-.2-.7-.8-.5-1.3s.8-.7 1.3-.5c2.2.9 4.6 1.4 7 1.4 9.9 0 18-8.1 18-18s-.3-4.1-1-6c-.2-.5 0-1.1.6-1.3.5-.2 1.1 0 1.3.6.8 2.1 1.1 4.4 1.1 6.7 0 11-9 20-20 20Z" class="cls-CritiVisi1"/><path d="M36.2 26.2c-.6 0-1-.4-1-1 0-.7-3-4.8-10-4.8s-9.9 4.1-10 4.8c0 .5-.5 1-1 1s-1-.4-1-1c0-2 4.1-6.8 12-6.8s12 4.8 12 6.8-.4 1-1 1Z" class="cls-CritiVisi2"/><path d="M25.2 32c-7.9 0-12-4.8-12-6.8s.4-1 1-1 1 .4 1 1c0 .7 3 4.8 10 4.8s9.9-4.1 10-4.8c0-.5.5-1 1-1s1 .4 1 1c0 2-4.1 6.8-12 6.8Z" class="cls-CritiVisi2"/><path d="M25.2 30c-2.7 0-4.8-2.2-4.8-4.8s2.2-4.8 4.8-4.8 4.8 2.2 4.8 4.8-2.2 4.8-4.8 4.8Zm0-7.6c-1.6 0-2.8 1.3-2.8 2.8s1.3 2.8 2.8 2.8 2.8-1.3 2.8-2.8-1.3-2.8-2.8-2.8Z" class="cls-CritiVisi2"/></svg> <h4>Critical Visibility</h4> </div> <p>Deployment of commercially available and open-source tools, as needed, to collect endpoint telemetry, full network packets, netflow and log data from on-premises and cloud environments to provide multiple vantage points for analysis.</p> </div> </div> </div> <div class="CompleteCyberV2__ContentMiddleBox"> <h3>Determine the Extent</h3> <div class="CompleteCyberV2__ContentMiddleBoxCards"> <div class="CompleteCyberV2__ContentMiddleBoxCard"> <div class="CompleteCyberV2__ContentMiddleBoxCardTop"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 48 48"><defs><style>.cls-LitSupp2{fill:#696de3}</style></defs><path d="M35 32c-.3 0-.5 0-.7-.3l-18-18c-.4-.4-.4-1 0-1.4s1-.4 1.4 0l18 18c.4.4.4 1 0 1.4-.2.2-.5.3-.7.3ZM45 22c-.3 0-.5 0-.7-.3l-18-18c-.4-.4-.4-1 0-1.4s1-.4 1.4 0l18 18c.4.4.4 1 0 1.4s-.5.3-.7.3Z" class="cls-LitSupp2"/><path d="M1 48c-.3 0-.5 0-.7-.3-.4-.4-.4-1 0-1.4l25-25c.4-.4 1-.4 1.4 0s.4 1 0 1.4l-25 25c-.2.2-.5.3-.7.3ZM15 16c-.3 0-.5 0-.7-.3-.4-.4-.4-1 0-1.4l14-14c.4-.4 1-.4 1.4 0s.4 1 0 1.4l-14 14c-.2.2-.5.3-.7.3ZM33 34c-.3 0-.5 0-.7-.3-.4-.4-.4-1 0-1.4l14-14c.4-.4 1-.4 1.4 0 .4.4.4 1 0 1.4l-14 14c-.2.2-.5.3-.7.3Z" class="cls-LitSupp2"/><path d="M47 48H31c-.6 0-1-.4-1-1s.4-1 1-1h16c.6 0 1 .4 1 1s-.4 1-1 1Z" style="fill:#19234d"/></svg> <h4>Litigation Support</h4> </div> <p>Expert and fact witness testimony, if needed, is available.</p> </div> <div class="CompleteCyberV2__ContentMiddleBoxCard"> <div class="CompleteCyberV2__ContentMiddleBoxCardTop"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 39.004 52"><defs><style>.cls-RobRepo1{fill:#19234d}.cls-RobRepo2{fill:#696de3}</style></defs><path d="M36.9 52H2.1C.9 52 0 51 0 49.9V3c0-1.7 1.4-3 3-3h20.8c.6 0 1 .4 1 1s-.4 1-1 1H3c-.6 0-1 .5-1 1v46.9s0 .1.1.1h34.7s.1 0 .1-.1V15.1c0-.6.4-1 1-1s1 .4 1 1v34.8c0 1.2-1 2.1-2.1 2.1h.1Z" class="cls-RobRepo1"/><path d="M38 16.1H23.9c-.6 0-1-.4-1-1V1c0-.4.2-.8.6-.9.4-.2.8 0 1.1.2l14.1 14.1c.3.3.4.7.2 1.1s-.5.6-.9.6Zm-13.2-2h10.7L24.8 3.4v10.7Z" class="cls-RobRepo1"/><path d="M19.5 45.5c-7.1 0-13-5.8-13-13s5.8-12.9 13-12.9 13 5.8 13 12.9-5.8 13-13 13Zm0-23.9c-6 0-11 4.9-11 10.9s4.9 11 11 11 11-4.9 11-11-4.9-10.9-11-10.9Z" class="cls-RobRepo2"/><path d="M31.5 33.5h-12c-.6 0-1-.4-1-1V20.6c0-.6.4-1 1-1s1 .4 1 1v10.9h11c.6 0 1 .4 1 1s-.4 1-1 1Z" class="cls-RobRepo2"/><path d="M11.5 41.5c-.3 0-.5 0-.7-.3-.4-.4-.4-1 0-1.4l8-8c.4-.4 1-.4 1.4 0s.4 1 0 1.4l-8 8c-.2.2-.5.3-.7.3Z" class="cls-RobRepo2"/></svg> <h4>Robust Reporting</h4> </div> <p>Detailed finding and impacts of the cyber investigation chronicle taken with lessons learned at the executive and technical level.</p> </div> <div class="CompleteCyberV2__ContentMiddleBoxCard"> <div class="CompleteCyberV2__ContentMiddleBoxCardTop"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 38 50.7"><defs><style>.cls-CompliSat1{fill:#19234d}.cls-CompliSat2{fill:#696de3}</style></defs><path d="M37 50.7H1c-.6 0-1-.4-1-1V4.2c0-.6.4-1 1-1h8.8c.6 0 1 .4 1 1s-.4 1-1 1H2v43.5h34V5.2h-7.8c-.6 0-1-.4-1-1s.4-1 1-1H37c.6 0 1 .4 1 1v45.5c0 .6-.4 1-1 1Z" class="cls-CompliSat1"/><path d="M24.1 8.4H13.9c-2.4 0-4.4-1.9-4.4-4.2V1c0-.6.4-1 1-1s1 .4 1 1v3.2c0 1.2 1.1 2.2 2.4 2.2h10.2c1.3 0 2.4-1 2.4-2.2V1c0-.6.4-1 1-1s1 .4 1 1v3.2c0 2.3-2 4.2-4.4 4.2Z" class="cls-CompliSat1"/><path d="M27.5 2H10.6c-.6 0-1-.4-1-1s.4-1 1-1h16.9c.6 0 1 .4 1 1s-.4 1-1 1ZM30.7 17.9h-9.6c-.6 0-1-.4-1-1s.4-1 1-1h9.6c.6 0 1 .4 1 1s-.4 1-1 1Z" class="cls-CompliSat1"/><path d="M9.5 30.6c-.3 0-.5 0-.7-.3l-2.2-2.1c-.4-.4-.4-1 0-1.4s1-.4 1.4 0l1.5 1.4 4.5-4.6c.4-.4 1-.4 1.4 0s.4 1 0 1.4l-5.2 5.3c-.2.2-.5.3-.7.3Z" class="cls-CompliSat2"/><path d="M30.7 28.5h-9.6c-.6 0-1-.4-1-1s.4-1 1-1h9.6c.6 0 1 .4 1 1s-.4 1-1 1Z" class="cls-CompliSat1"/><path d="M9.5 20c-.3 0-.5 0-.7-.3l-2.2-2.1c-.4-.4-.4-1 0-1.4s1-.4 1.4 0l1.5 1.4L14 13c.4-.4 1-.4 1.4 0s.4 1 0 1.4l-5.2 5.3c-.2.2-.5.3-.7.3Z" class="cls-CompliSat2"/><path d="M30.7 17.9h-9.6c-.6 0-1-.4-1-1s.4-1 1-1h9.6c.6 0 1 .4 1 1s-.4 1-1 1ZM30.7 39.1h-9.6c-.6 0-1-.4-1-1s.4-1 1-1h9.6c.6 0 1 .4 1 1s-.4 1-1 1Z" class="cls-CompliSat1"/><path d="M9.5 41.2c-.3 0-.5 0-.7-.3l-2.2-2.1c-.4-.4-.4-1 0-1.4s1-.4 1.4 0l1.5 1.4 4.5-4.6c.4-.4 1-.4 1.4 0s.4 1 0 1.4l-5.2 5.3c-.2.2-.5.3-.7.3Z" class="cls-CompliSat2"/><path d="M30.7 39.1h-9.6c-.6 0-1-.4-1-1s.4-1 1-1h9.6c.6 0 1 .4 1 1s-.4 1-1 1Z" class="cls-CompliSat1"/></svg> <h4>Compliance Satisfaction</h4> </div> <p>Meets regulatory requirements with centralized collection, retention and reporting.</p> </div> <div class="CompleteCyberV2__ContentMiddleBoxCard"> <div class="CompleteCyberV2__ContentMiddleBoxCardTop"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 48 42"><defs><style>.cls-EviPreser1{fill:#19234d}.cls-EviPreser2{fill:#696de3}</style></defs><path d="M27 38H3c-1.7 0-3-1.3-3-3V3c0-1.7 1.3-3 3-3h14.9c.6 0 1 .4 1 1s-.4 1-1 1H3c-.6 0-1 .4-1 1v32c0 .6.4 1 1 1h24c.6 0 1 .4 1 1s-.4 1-1 1ZM47 22c-.6 0-1-.4-1-1V8c0-.6-.4-1-1-1H24c-.6 0-1-.4-1-1s.4-1 1-1h21c1.7 0 3 1.3 3 3v13c0 .6-.4 1-1 1Z" class="cls-EviPreser1"/><path d="M24 7c-.2 0-.4 0-.6-.2l-6.1-5c-.4-.3-.5-1-.1-1.4.3-.4 1-.5 1.4-.1l6.1 5c.4.3.5 1 .1 1.4-.2.2-.5.4-.8.4V7Z" class="cls-EviPreser1"/><path d="M47 42H33c-.6 0-1-.4-1-1V31c0-.6.4-1 1-1h14c.6 0 1 .4 1 1v10c0 .6-.4 1-1 1Zm-13-2h12v-8H34v8Z" class="cls-EviPreser2"/><path d="M36 32c-.6 0-1-.4-1-1v-2c0-2.8 2.2-5 5-5s5 2.2 5 5v2c0 .6-.4 1-1 1s-1-.4-1-1v-2c0-1.7-1.3-3-3-3s-3 1.3-3 3v2c0 .6-.4 1-1 1Z" class="cls-EviPreser2"/></svg> <h4>Evidence Preservation</h4> </div> <p>Gathers and stores incident details that meet legal, insurance and regulatory requirements.</p> </div> </div> </div> </div> <div class="WhyOverOthers__NavyCTA"> <div class="WhyOverOthers__NavyCTALeft"> <img src="https://esentire-dot-com-assets.s3.amazonaws.com/assetsV4/Common/DFIR/ir_guide%402x.png" alt=""> </div> <div class="WhyOverOthers__NavyCTAMiddle"> <h3 class="eyebrow">GUIDE</h3> <h2>10 Questions to Consider When Evaluating an Incident Response Provider</h2> <p>This guide offers insights into the importance of incident response, the challenges that your incident response service provider should address, and the top 10 questions to help you qualify potential incident response vendors.</p> </div> <div class="WhyOverOthers__NavyCTARight"> <a href="/resources/library/10-questions-to-consider-when-evaluating-an-incident-response-provider">Get The Guide</a> </div> </div> </div> </section> <section class="CyberSecurityInvestigations"> <div class="CyberSecurityInvestigations__Content"> <h2>Meet the eSentire Cyber Security Investigations Team</h2> <p>With the eSentire Cyber Security Investigations (CSI) team, you gain access to expertly trained incident responders, including computer forensic practitioners with decades of experience serving government intelligence agencies, federal and city law enforcement, the United States Military, and Fortune 500 companies.</p> <h3>Our team of responders has extensive digital forensics and incident response experience and multiple industry certifications:</h3> <div class="CyberSecurityInvestigations__Cards"> <div class="CyberSecurityInvestigations__Card"> <div class="CyberSecurityInvestigations__CardTop"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 40 40"><defs><style>.cls-CSITeam1{fill:#19234d}</style></defs><g id="Layer_1"><circle cx="20" cy="20" r="20" style="fill:#40c3d9"/><path d="M15.2 10.6c.6 0 1 .4 1 1V17c0 .6-.4 1-1 1s-1-.4-1-1v-5.4c0-.6.4-1 1-1ZM24.8 10.6c.6 0 1 .4 1 1V17c0 .6-.4 1-1 1s-1-.4-1-1v-5.4c0-.6.4-1 1-1Z" class="cls-CSITeam1"/><path d="M15.2 12.6H15c-.5 0-.9-.6-.8-1.2.4-2.6 3.3-4.4 5.7-4.4 2.4 0 5.3 1.8 5.8 4.4 0 .5-.3 1.1-.8 1.2-.6 0-1.1-.3-1.2-.8-.3-1.6-2.2-2.7-3.7-2.8-1.8 0-3.6 1.3-3.8 2.8 0 .5-.5.8-1 .8ZM23.2 23.4c-.2 0-.4 0-.6-.2-.4-.3-.5-1-.2-1.4 1.6-2 1.4-4.7 1.4-4.7 0-.5.4-1 .9-1.1.6 0 1 .4 1.1.9 0 .1.2 3.5-1.8 6.1-.2.3-.5.4-.8.4ZM16.8 23.4c-.3 0-.6-.1-.8-.4-2-2.6-1.8-6-1.8-6.1 0-.6.5-1 1.1-.9.6 0 1 .5.9 1.1 0 0-.2 2.7 1.4 4.7.3.4.3 1.1-.2 1.4-.2.1-.4.2-.6.2Z" class="cls-CSITeam1"/><path d="M30.8 27h-.4l-7.6-3.6c-.5-.2-.7-.8-.5-1.3.2-.5.8-.7 1.3-.5l7.6 3.6c.5.2.7.8.5 1.3-.2.4-.5.6-.9.6ZM9.2 27c-.4 0-.7-.2-.9-.6-.2-.5 0-1.1.5-1.3l7.6-3.6c.5-.2 1.1 0 1.3.5.2.5 0 1.1-.5 1.3l-7.6 3.6h-.4Z" class="cls-CSITeam1"/><path d="M29.7 30.6H10.3c-1.2 0-2.2-1-2.2-2.2V26c0-.6.4-1 1-1s1 .4 1 1v2.4s0 .2.2.2h19.3s.2 0 .2-.2V26c0-.6.4-1 1-1s1 .4 1 1v2.4c0 1.2-1 2.2-2.2 2.2Z" class="cls-CSITeam1"/></g></svg> <p>Certified Information Systems Security Professional</p> </div> <span>(CISSP)</span> </div> <div class="CyberSecurityInvestigations__Card"> <div class="CyberSecurityInvestigations__CardTop"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 40 40"><defs><style>.cls-CSITeam1{fill:#19234d}</style></defs><g id="Layer_1"><circle cx="20" cy="20" r="20" style="fill:#40c3d9"/><path d="M15.2 10.6c.6 0 1 .4 1 1V17c0 .6-.4 1-1 1s-1-.4-1-1v-5.4c0-.6.4-1 1-1ZM24.8 10.6c.6 0 1 .4 1 1V17c0 .6-.4 1-1 1s-1-.4-1-1v-5.4c0-.6.4-1 1-1Z" class="cls-CSITeam1"/><path d="M15.2 12.6H15c-.5 0-.9-.6-.8-1.2.4-2.6 3.3-4.4 5.7-4.4 2.4 0 5.3 1.8 5.8 4.4 0 .5-.3 1.1-.8 1.2-.6 0-1.1-.3-1.2-.8-.3-1.6-2.2-2.7-3.7-2.8-1.8 0-3.6 1.3-3.8 2.8 0 .5-.5.8-1 .8ZM23.2 23.4c-.2 0-.4 0-.6-.2-.4-.3-.5-1-.2-1.4 1.6-2 1.4-4.7 1.4-4.7 0-.5.4-1 .9-1.1.6 0 1 .4 1.1.9 0 .1.2 3.5-1.8 6.1-.2.3-.5.4-.8.4ZM16.8 23.4c-.3 0-.6-.1-.8-.4-2-2.6-1.8-6-1.8-6.1 0-.6.5-1 1.1-.9.6 0 1 .5.9 1.1 0 0-.2 2.7 1.4 4.7.3.4.3 1.1-.2 1.4-.2.1-.4.2-.6.2Z" class="cls-CSITeam1"/><path d="M30.8 27h-.4l-7.6-3.6c-.5-.2-.7-.8-.5-1.3.2-.5.8-.7 1.3-.5l7.6 3.6c.5.2.7.8.5 1.3-.2.4-.5.6-.9.6ZM9.2 27c-.4 0-.7-.2-.9-.6-.2-.5 0-1.1.5-1.3l7.6-3.6c.5-.2 1.1 0 1.3.5.2.5 0 1.1-.5 1.3l-7.6 3.6h-.4Z" class="cls-CSITeam1"/><path d="M29.7 30.6H10.3c-1.2 0-2.2-1-2.2-2.2V26c0-.6.4-1 1-1s1 .4 1 1v2.4s0 .2.2.2h19.3s.2 0 .2-.2V26c0-.6.4-1 1-1s1 .4 1 1v2.4c0 1.2-1 2.2-2.2 2.2Z" class="cls-CSITeam1"/></g></svg> <p>Licensed Private Investigator</p> </div> <span>(LPI)</span> </div> <div class="CyberSecurityInvestigations__Card"> <div class="CyberSecurityInvestigations__CardTop"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 40 40"><defs><style>.cls-CSITeam1{fill:#19234d}</style></defs><g id="Layer_1"><circle cx="20" cy="20" r="20" style="fill:#40c3d9"/><path d="M15.2 10.6c.6 0 1 .4 1 1V17c0 .6-.4 1-1 1s-1-.4-1-1v-5.4c0-.6.4-1 1-1ZM24.8 10.6c.6 0 1 .4 1 1V17c0 .6-.4 1-1 1s-1-.4-1-1v-5.4c0-.6.4-1 1-1Z" class="cls-CSITeam1"/><path d="M15.2 12.6H15c-.5 0-.9-.6-.8-1.2.4-2.6 3.3-4.4 5.7-4.4 2.4 0 5.3 1.8 5.8 4.4 0 .5-.3 1.1-.8 1.2-.6 0-1.1-.3-1.2-.8-.3-1.6-2.2-2.7-3.7-2.8-1.8 0-3.6 1.3-3.8 2.8 0 .5-.5.8-1 .8ZM23.2 23.4c-.2 0-.4 0-.6-.2-.4-.3-.5-1-.2-1.4 1.6-2 1.4-4.7 1.4-4.7 0-.5.4-1 .9-1.1.6 0 1 .4 1.1.9 0 .1.2 3.5-1.8 6.1-.2.3-.5.4-.8.4ZM16.8 23.4c-.3 0-.6-.1-.8-.4-2-2.6-1.8-6-1.8-6.1 0-.6.5-1 1.1-.9.6 0 1 .5.9 1.1 0 0-.2 2.7 1.4 4.7.3.4.3 1.1-.2 1.4-.2.1-.4.2-.6.2Z" class="cls-CSITeam1"/><path d="M30.8 27h-.4l-7.6-3.6c-.5-.2-.7-.8-.5-1.3.2-.5.8-.7 1.3-.5l7.6 3.6c.5.2.7.8.5 1.3-.2.4-.5.6-.9.6ZM9.2 27c-.4 0-.7-.2-.9-.6-.2-.5 0-1.1.5-1.3l7.6-3.6c.5-.2 1.1 0 1.3.5.2.5 0 1.1-.5 1.3l-7.6 3.6h-.4Z" class="cls-CSITeam1"/><path d="M29.7 30.6H10.3c-1.2 0-2.2-1-2.2-2.2V26c0-.6.4-1 1-1s1 .4 1 1v2.4s0 .2.2.2h19.3s.2 0 .2-.2V26c0-.6.4-1 1-1s1 .4 1 1v2.4c0 1.2-1 2.2-2.2 2.2Z" class="cls-CSITeam1"/></g></svg> <p>Certified Hacker Forensics Investigator (C|HFI)</p> </div> <span>(C|HFI)</span> </div> <div class="CyberSecurityInvestigations__Card"> <div class="CyberSecurityInvestigations__CardTop"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 40 40"><defs><style>.cls-CSITeam1{fill:#19234d}</style></defs><g id="Layer_1"><circle cx="20" cy="20" r="20" style="fill:#40c3d9"/><path d="M15.2 10.6c.6 0 1 .4 1 1V17c0 .6-.4 1-1 1s-1-.4-1-1v-5.4c0-.6.4-1 1-1ZM24.8 10.6c.6 0 1 .4 1 1V17c0 .6-.4 1-1 1s-1-.4-1-1v-5.4c0-.6.4-1 1-1Z" class="cls-CSITeam1"/><path d="M15.2 12.6H15c-.5 0-.9-.6-.8-1.2.4-2.6 3.3-4.4 5.7-4.4 2.4 0 5.3 1.8 5.8 4.4 0 .5-.3 1.1-.8 1.2-.6 0-1.1-.3-1.2-.8-.3-1.6-2.2-2.7-3.7-2.8-1.8 0-3.6 1.3-3.8 2.8 0 .5-.5.8-1 .8ZM23.2 23.4c-.2 0-.4 0-.6-.2-.4-.3-.5-1-.2-1.4 1.6-2 1.4-4.7 1.4-4.7 0-.5.4-1 .9-1.1.6 0 1 .4 1.1.9 0 .1.2 3.5-1.8 6.1-.2.3-.5.4-.8.4ZM16.8 23.4c-.3 0-.6-.1-.8-.4-2-2.6-1.8-6-1.8-6.1 0-.6.5-1 1.1-.9.6 0 1 .5.9 1.1 0 0-.2 2.7 1.4 4.7.3.4.3 1.1-.2 1.4-.2.1-.4.2-.6.2Z" class="cls-CSITeam1"/><path d="M30.8 27h-.4l-7.6-3.6c-.5-.2-.7-.8-.5-1.3.2-.5.8-.7 1.3-.5l7.6 3.6c.5.2.7.8.5 1.3-.2.4-.5.6-.9.6ZM9.2 27c-.4 0-.7-.2-.9-.6-.2-.5 0-1.1.5-1.3l7.6-3.6c.5-.2 1.1 0 1.3.5.2.5 0 1.1-.5 1.3l-7.6 3.6h-.4Z" class="cls-CSITeam1"/><path d="M29.7 30.6H10.3c-1.2 0-2.2-1-2.2-2.2V26c0-.6.4-1 1-1s1 .4 1 1v2.4s0 .2.2.2h19.3s.2 0 .2-.2V26c0-.6.4-1 1-1s1 .4 1 1v2.4c0 1.2-1 2.2-2.2 2.2Z" class="cls-CSITeam1"/></g></svg> <p>Certified Forensics Consultant</p> </div> <span>(CFC)</span> </div> <div class="CyberSecurityInvestigations__Card"> <div class="CyberSecurityInvestigations__CardTop"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 40 40"><defs><style>.cls-CSITeam1{fill:#19234d}</style></defs><g id="Layer_1"><circle cx="20" cy="20" r="20" style="fill:#40c3d9"/><path d="M15.2 10.6c.6 0 1 .4 1 1V17c0 .6-.4 1-1 1s-1-.4-1-1v-5.4c0-.6.4-1 1-1ZM24.8 10.6c.6 0 1 .4 1 1V17c0 .6-.4 1-1 1s-1-.4-1-1v-5.4c0-.6.4-1 1-1Z" class="cls-CSITeam1"/><path d="M15.2 12.6H15c-.5 0-.9-.6-.8-1.2.4-2.6 3.3-4.4 5.7-4.4 2.4 0 5.3 1.8 5.8 4.4 0 .5-.3 1.1-.8 1.2-.6 0-1.1-.3-1.2-.8-.3-1.6-2.2-2.7-3.7-2.8-1.8 0-3.6 1.3-3.8 2.8 0 .5-.5.8-1 .8ZM23.2 23.4c-.2 0-.4 0-.6-.2-.4-.3-.5-1-.2-1.4 1.6-2 1.4-4.7 1.4-4.7 0-.5.4-1 .9-1.1.6 0 1 .4 1.1.9 0 .1.2 3.5-1.8 6.1-.2.3-.5.4-.8.4ZM16.8 23.4c-.3 0-.6-.1-.8-.4-2-2.6-1.8-6-1.8-6.1 0-.6.5-1 1.1-.9.6 0 1 .5.9 1.1 0 0-.2 2.7 1.4 4.7.3.4.3 1.1-.2 1.4-.2.1-.4.2-.6.2Z" class="cls-CSITeam1"/><path d="M30.8 27h-.4l-7.6-3.6c-.5-.2-.7-.8-.5-1.3.2-.5.8-.7 1.3-.5l7.6 3.6c.5.2.7.8.5 1.3-.2.4-.5.6-.9.6ZM9.2 27c-.4 0-.7-.2-.9-.6-.2-.5 0-1.1.5-1.3l7.6-3.6c.5-.2 1.1 0 1.3.5.2.5 0 1.1-.5 1.3l-7.6 3.6h-.4Z" class="cls-CSITeam1"/><path d="M29.7 30.6H10.3c-1.2 0-2.2-1-2.2-2.2V26c0-.6.4-1 1-1s1 .4 1 1v2.4s0 .2.2.2h19.3s.2 0 .2-.2V26c0-.6.4-1 1-1s1 .4 1 1v2.4c0 1.2-1 2.2-2.2 2.2Z" class="cls-CSITeam1"/></g></svg> <p>Certified Computer Forensics Examiner</p> </div> <span>(CCFE)</span> </div> <div class="CyberSecurityInvestigations__Card"> <div class="CyberSecurityInvestigations__CardTop"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 40 40"><defs><style>.cls-CSITeam1{fill:#19234d}</style></defs><g id="Layer_1"><circle cx="20" cy="20" r="20" style="fill:#40c3d9"/><path d="M15.2 10.6c.6 0 1 .4 1 1V17c0 .6-.4 1-1 1s-1-.4-1-1v-5.4c0-.6.4-1 1-1ZM24.8 10.6c.6 0 1 .4 1 1V17c0 .6-.4 1-1 1s-1-.4-1-1v-5.4c0-.6.4-1 1-1Z" class="cls-CSITeam1"/><path d="M15.2 12.6H15c-.5 0-.9-.6-.8-1.2.4-2.6 3.3-4.4 5.7-4.4 2.4 0 5.3 1.8 5.8 4.4 0 .5-.3 1.1-.8 1.2-.6 0-1.1-.3-1.2-.8-.3-1.6-2.2-2.7-3.7-2.8-1.8 0-3.6 1.3-3.8 2.8 0 .5-.5.8-1 .8ZM23.2 23.4c-.2 0-.4 0-.6-.2-.4-.3-.5-1-.2-1.4 1.6-2 1.4-4.7 1.4-4.7 0-.5.4-1 .9-1.1.6 0 1 .4 1.1.9 0 .1.2 3.5-1.8 6.1-.2.3-.5.4-.8.4ZM16.8 23.4c-.3 0-.6-.1-.8-.4-2-2.6-1.8-6-1.8-6.1 0-.6.5-1 1.1-.9.6 0 1 .5.9 1.1 0 0-.2 2.7 1.4 4.7.3.4.3 1.1-.2 1.4-.2.1-.4.2-.6.2Z" class="cls-CSITeam1"/><path d="M30.8 27h-.4l-7.6-3.6c-.5-.2-.7-.8-.5-1.3.2-.5.8-.7 1.3-.5l7.6 3.6c.5.2.7.8.5 1.3-.2.4-.5.6-.9.6ZM9.2 27c-.4 0-.7-.2-.9-.6-.2-.5 0-1.1.5-1.3l7.6-3.6c.5-.2 1.1 0 1.3.5.2.5 0 1.1-.5 1.3l-7.6 3.6h-.4Z" class="cls-CSITeam1"/><path d="M29.7 30.6H10.3c-1.2 0-2.2-1-2.2-2.2V26c0-.6.4-1 1-1s1 .4 1 1v2.4s0 .2.2.2h19.3s.2 0 .2-.2V26c0-.6.4-1 1-1s1 .4 1 1v2.4c0 1.2-1 2.2-2.2 2.2Z" class="cls-CSITeam1"/></g></svg> <p>GIAC Certified Incident Handler</p> </div> <span>(GCIH)</span> </div> </div> <p>eSentire CSI partners with our global 24/7 SOC Cyber Analysts and Elite Threat Hunters, extending your Digital Forensics and Incident Response support and expertise across hundreds of team members with deep knowledge of the tactics, techniques, and procedures (TTPs) adversaries use to break through your defenses.</p> <div class="CyberSecurityInvestigations__PlusCards"> <div class="CyberSecurityInvestigations__PlusCard"> <h4>Delivers Results</h4> <ul> <li>Attacks are quickly contained and incidents are resolved</li> <li>Recovery is supported, eliminating the chance for recurrence</li> <li>Root causes are analyzed for future threat eradication</li> <li>Systems cleared for return to standard business operations</li> </ul> </div> <div class="CyberSecurityInvestigations__PlusCard"> <h4>Power of 24/7 SOC Team</h4> <ul> <li>Access to hundreds of team members</li> <li>Support from 24/7 SOC Cyber Analysts and Elite Threat Hunters with hands-on incident response expertise</li> </ul> </div> <div class="CyberSecurityInvestigations__PlusCard"> <h4>Flexible Delivery Model</h4> <ul> <li>Can be engaged on Retainer for Incident Response and IR Readiness</li> <li>Available to address Emergency Incident Response</li> </ul> </div> </div> </div> </section> <section class="DfirTechAdvantage"> <div class="DfirTechAdvantage__Content"> <h2>eSentire's Digital Forensics Technology Advantage</h2> <p>Our powerful eSentire agent makes our 4-hour threat suppression possible. This proprietary eSentire digital forensics tool enables our team to perform end-to-end investigations remotely and at unmatched velocity. We strategically deploy eSentire agents across your network and IT systems the moment you onboard as a customer. This allows eSentire to establish deep visibility and forensic capabilities in your environment before an incident ever occurs.</p> <p>When a security incident requiring deep investigation does occur, you have the advantage. The agents give our Cyber Security Investigations team immediate access and forensic capabilities to actively start working within minutes of your call to suppress the threat in your environment. In 4 hours, the immediate threat will be suppressed and completely contained.</p> <div class="DfirTechAdvantage__ContainerCover"> <div class="DfirTechAdvantage__Container"> <h3>Benefits of leveraging the eSentire agent:</h3> <ul> <li>Unmatched time-to-value</li> <li>Unparalleled depth of visibility & investigation data</li> <li>Real-time visibility across all deployed assets</li> <li>Accelerated incident response with reduced mean time to identify (MTTI) and mean time to contain (MTTC)</li> <li>Forensically-assured data at a fraction of the cost</li> <li>Support for remote work setting investigations with low-bandwidth connections</li> <li>e-Discovery and data collection for HR investigations, M&A activity, corporate security, and Personally Identifiable Information (PII) scanning</li> <li>Trusted by government intelligence, federal law enforcement & military personnel</li> </ul> </div> <div class="DfirTechAdvantage__BottomVideo"> <div class="DfirTechAdvantage__BottomVideoLeft Video-Btn" data-modal-video="video-o9zbblygkl" data-modal-video-id="o9zbblygkl"> <div class="DfirTechAdvantage__PreviewVideo PreviewVideo"> <div class="wistia_responsive_padding" style="padding:56.25% 0 0 0;position:relative;"> <div class="wistia_responsive_wrapper" style="height:100%;left:0;position:absolute;top:0;width:100%;"> <div class="wistia_embed wistia_async_rimfu5mror seo=false videoFoam=true" style="height:100%;width:100%"> </div> </div> </div> <svg data-name="play-icon-svg" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 41.38 41.18"><defs><style>.play-icon-svg-1{fill:none}</style></defs><g id="Group_1246" data-name="Group 1246"><g id="Group_1245" data-name="Group 1245"><path id="Path_4266-2" data-name="Path 4266-2" d="M20.69.58c11.04 0 19.99 8.95 19.99 19.99s-8.95 19.99-19.99 19.99S.7 31.61.7 20.57 9.65.58 20.69.58" style="fill:#696de3"></path><path id="Path_4267" data-name="Path 4267" d="M40.68 20.41H.7C.59 31.45 9.45 40.49 20.49 40.6c11.04.11 20.08-8.75 20.19-19.79v-.4" style="fill:#787be6"></path><path id="Path_4268" data-name="Path 4268" d="M15.16 31.82c-.19 0-.37-.04-.54-.13-.39-.2-.64-.6-.64-1.04V10.48c0-.44.25-.84.64-1.04.4-.2.87-.16 1.23.09l14.16 10.09a1.156 1.156 0 0 1 0 1.89L15.85 31.6c-.2.14-.44.22-.69.22" style="fill:#f9f9f9"></path><path id="Path_4269" data-name="Path 4269" d="M13.98 20.5v10.23a1.182 1.182 0 0 0 1.87.96l14.16-10.23c.31-.22.49-.58.49-.96H13.98Z" style="fill:#e2dff4"></path></g></g></svg> </div> </div> <div class="DfirTechAdvantage__BottomVideoCenter"> <h4>VIDEO</h4> <h3>The eSentire Agent</h3> <p>Watch this video to see how eSentire's agent enables our 4-hour threat suppression SLA as part of our On-Demand 24/7 IR Retainer offering.</p> </div> <div class="DfirTechAdvantage__BottomVideoRight"> <a class="Video-Btn" data-modal-video="video-o9zbblygkl" data-modal-video-id="o9zbblygkl">WATCH NOW</a> </div> </div> </div> </div> </section> <div class="MultiVideo__VideoModal" data-modal-id="video-o9zbblygkl"> <!-- Modal content --> <div class="MultiVideo__VideoModal-content"> <span class="MultiVideo__VideoModal-close" data-modal-video="video-o9zbblygkl" data-modal-video-id="o9zbblygkl">×</span> <div class="VideoCards__VideoModal-frameContainer"> <script src="//fast.wistia.com/embed/medias/o9zbblygkl.jsonp" async></script> <div class="wistia_embed wistia_async_o9zbblygkl"> </div> </div> </div> </div><script src="//fast.wistia.net/assets/external/E-v1.js" defer></script> <script> let videos = document.querySelectorAll('.Video-Btn'); let closeBtns = document.querySelectorAll('.MultiVideo__VideoModal-close'); videos.forEach(video => { video.addEventListener('click', (e) => { e.preventDefault(); const id = video.getAttribute('data-modal-video'); const videoId = video.getAttribute('data-modal-video-id'); document.querySelector(`.MultiVideo__VideoModal[data-modal-id="${id}"]`).classList.add('active'); document.getElementsByTagName("body")[0].style.overflow = "hidden"; var videoHandle = Wistia.api(videoId); videoHandle.play(); }); }); closeBtns.forEach(close => { close.addEventListener('click', (e) => { e.preventDefault(); const id = close.getAttribute('data-modal-video'); const videoId = close.getAttribute('data-modal-video-id'); document.querySelector(`.MultiVideo__VideoModal[data-modal-id="${id}"]`).classList.remove('active'); document.getElementsByTagName("body")[0].style.overflow = "auto"; var videoHandle = Wistia.api(videoId); videoHandle.pause(); }); }); </script> <section class="MdrIR"> <div class="MdrIR__Content"> <div class="MdrIR__ContentTop"> <h2>The Benefit of MDR and Digital Forensics and Incident Response Services</h2> <p>Leveraging Managed Detection and Response Services with Digital Forensics and Incident Response services allows you to extend your capabilities across the full incident response lifecycle.</p> <p>Managed Detection and Response services gives you access to 24/7 expert SOC support for full attack visibility, real-time response, rapid threat containment, and remediation in case of an incident. However, MDR services weren’t designed to furnish evidence that will serve in a court of law.</p> <p>Your Digital Forensics and Incident Response services provide much deeper cyber investigative capabilities explicitly designed to fulfil the most exacting requirements of cyber insurers, regulators and prosecutors.</p> <a href="/what-we-do/esentire-managed-detection-and-response">LEARN MORE ABOUT<br> ESENTIRE MDR →</a> </div> <div class="MdrIR__ContentBottom"> <div class="MdrIR__ContentBottomLeft"> <h4>REPORT</h4> <h3>MDR + IR: A Recipe for Cyber Resilience in a Twenty-First Century Risk Landscape</h3> <p>Download this report to learn:</p> <ul> <li>Why it's necessary to enhance your 24/7 threat detection, investigation, and response capabilities with Digital Forensics and Incident Response</li> <li>The benefits of combining MDR and Incident Response</li> <li>What to look for in an Incident Response provider</li> </ul> </div> <a href="/resources/library/mdr-ir-a-recipe-for-cyber-resilience-in-a-twenty-first-century-risk-landscape">GET THE GUIDE →</a> </div> </div> </section> <section class="Recommended"> <div class="Recommended__Top"> <h2>Learn More About How We Can Safeguard Your Business with Digital Forensics and Incident Response Services</h2> </div> <div class="Recommended__Bottom"> <a href="/resources/library/on-demand-incident-response-service" class="Recommended__Block" data-aos="fade-up" data-aos-duration="1000" data-aos-delay="150"> <div class="Recommended__BlockTop"> <div class="Recommended__BlockTitle">DATA SHEET</div> <div class="Recommended__BlockSummary">On-Demand 24/7 Incident Response</div> </div> <div class="Recommended__BlockFooter">VIEW DATA SHEET →</div> </a> <a href="/resources/library/emergency-incident-response-service" class="Recommended__Block" data-aos="fade-up" data-aos-duration="1000" data-aos-delay="150"> <div class="Recommended__BlockTop"> <div class="Recommended__BlockTitle">DATA SHEET</div> <div class="Recommended__BlockSummary">Emergency Incident Response Service</div> </div> <div class="Recommended__BlockFooter">VIEW DATA SHEET →</div> </a> <a href="/resources/library/incident-response-ir-readiness-service" class="Recommended__Block" data-aos="fade-up" data-aos-duration="1000" data-aos-delay="150"> <div class="Recommended__BlockTop"> <div class="Recommended__BlockTitle">DATA SHEET</div> <div class="Recommended__BlockSummary">Incident Response (IR) Readiness Service</div> </div> <div class="Recommended__BlockFooter">VIEW DATA SHEET →</div> </a> </div> </section> <script src="https://cdn.jsdelivr.net/npm/swiper@9/swiper-bundle.min.js"></script> <section class="TestimonialsSliderV2 TestimonialsSlider__V2 TestimonialsSlider__GetStartedSmallDFIR"> <div class="TestimonialsSliderV2__Content"> <h2>Security Leaders Count on eSentire</h2> <div class="swiper TestimonialsSliderV2__Slides"> <div class="swiper-wrapper"> <div class="TestimonialsSliderV2__SlideContainer swiper-slide"> <div class="TestimonialsSliderV2__Slide"> <div class="TestimonialsSliderV2__SlideIcon"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 59 59"><defs><clipPath id="a"><path d="M0 0h59v59H0z" style="stroke-width:0;fill:none"/></clipPath></defs><path d="M0 0h59v59H0z" style="fill:#40c3d9;stroke-width:0"/><g><path d="M18.44 42.03c-2.5 0-4.33-.57-5.47-1.71a5.819 5.819 0 0 1-1.71-4.3v-1.75c0-1.65.24-3.3.71-4.89.95-3.29 2.58-6.33 4.8-8.93a25.06 25.06 0 0 1 3.59-3.47h7.77a37.277 37.277 0 0 0-4.72 5.09 18.88 18.88 0 0 0-2.97 5.76c1.55.2 2.95.99 3.93 2.21a6.378 6.378 0 0 1 1.25 3.88v2.09c.05 1.61-.57 3.16-1.71 4.3-1.14 1.14-2.97 1.71-5.47 1.71m19.62.01c-2.51 0-4.33-.57-5.47-1.71a5.819 5.819 0 0 1-1.71-4.3v-1.75c0-1.65.25-3.3.71-4.89.95-3.29 2.58-6.33 4.8-8.93 1.08-1.27 2.28-2.43 3.59-3.47h7.76c-1.72 1.55-3.3 3.25-4.72 5.09a18.969 18.969 0 0 0-2.96 5.76c1.55.2 2.96.99 3.93 2.21a6.378 6.378 0 0 1 1.25 3.88v2.09c.05 1.61-.57 3.16-1.71 4.3-1.14 1.14-2.97 1.71-5.47 1.71" style="fill:#0e142b;stroke-width:0"/></g></svg> </div> <div class="TestimonialsSliderV2__SlideTop"> <blockquote>I have enjoyed having the additional security knowledge on my team. I sleep better at night." </blockquote> <h5>David Greene</h5> <h6>IT Vice President | CWS Apartment Homes. Inc.</h6> <p><span>Real Estate Industry</span></p> </div> <div class="TestimonialsSliderV2__SlideBottom"> <img src="https://esentire-dot-com-assets.s3.amazonaws.com/assetsV4/Common/Testimonials/CWS-Apartment-Homes-grey.png" alt="A logo of eSentire’s customer, CWS Apartment Homes, Inc., next to a testimonial which discusses how eSentrie managed phishing training and security awareness training keeps the organization’s environment secure 24/7." /> </div> </div> </div> <div class="TestimonialsSliderV2__SlideContainer swiper-slide"> <div class="TestimonialsSliderV2__Slide"> <div class="TestimonialsSliderV2__SlideIcon"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 59 59"><defs><clipPath id="a"><path d="M0 0h59v59H0z" style="stroke-width:0;fill:none"/></clipPath></defs><path d="M0 0h59v59H0z" style="fill:#40c3d9;stroke-width:0"/><g><path d="M18.44 42.03c-2.5 0-4.33-.57-5.47-1.71a5.819 5.819 0 0 1-1.71-4.3v-1.75c0-1.65.24-3.3.71-4.89.95-3.29 2.58-6.33 4.8-8.93a25.06 25.06 0 0 1 3.59-3.47h7.77a37.277 37.277 0 0 0-4.72 5.09 18.88 18.88 0 0 0-2.97 5.76c1.55.2 2.95.99 3.93 2.21a6.378 6.378 0 0 1 1.25 3.88v2.09c.05 1.61-.57 3.16-1.71 4.3-1.14 1.14-2.97 1.71-5.47 1.71m19.62.01c-2.51 0-4.33-.57-5.47-1.71a5.819 5.819 0 0 1-1.71-4.3v-1.75c0-1.65.25-3.3.71-4.89.95-3.29 2.58-6.33 4.8-8.93 1.08-1.27 2.28-2.43 3.59-3.47h7.76c-1.72 1.55-3.3 3.25-4.72 5.09a18.969 18.969 0 0 0-2.96 5.76c1.55.2 2.96.99 3.93 2.21a6.378 6.378 0 0 1 1.25 3.88v2.09c.05 1.61-.57 3.16-1.71 4.3-1.14 1.14-2.97 1.71-5.47 1.71" style="fill:#0e142b;stroke-width:0"/></g></svg> </div> <div class="TestimonialsSliderV2__SlideTop"> <blockquote>eSentire provides a better security posture for our organization." </blockquote> <h5>Shahab Kazim</h5> <h6>Chief Technology Officer (CTO) | EnCap Investments LP</h6> <p><span>Finance Industry</span></p> </div> <div class="TestimonialsSliderV2__SlideBottom"> <img src="https://esentire-dot-com-assets.s3.amazonaws.com/assetsV4/Common/Testimonials/EnCap-Investments-LP-black.png" alt="En Cap Investments LP black" /> </div> </div> </div> <div class="TestimonialsSliderV2__SlideContainer swiper-slide"> <div class="TestimonialsSliderV2__Slide"> <div class="TestimonialsSliderV2__SlideIcon"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 59 59"><defs><clipPath id="a"><path d="M0 0h59v59H0z" style="stroke-width:0;fill:none"/></clipPath></defs><path d="M0 0h59v59H0z" style="fill:#40c3d9;stroke-width:0"/><g><path d="M18.44 42.03c-2.5 0-4.33-.57-5.47-1.71a5.819 5.819 0 0 1-1.71-4.3v-1.75c0-1.65.24-3.3.71-4.89.95-3.29 2.58-6.33 4.8-8.93a25.06 25.06 0 0 1 3.59-3.47h7.77a37.277 37.277 0 0 0-4.72 5.09 18.88 18.88 0 0 0-2.97 5.76c1.55.2 2.95.99 3.93 2.21a6.378 6.378 0 0 1 1.25 3.88v2.09c.05 1.61-.57 3.16-1.71 4.3-1.14 1.14-2.97 1.71-5.47 1.71m19.62.01c-2.51 0-4.33-.57-5.47-1.71a5.819 5.819 0 0 1-1.71-4.3v-1.75c0-1.65.25-3.3.71-4.89.95-3.29 2.58-6.33 4.8-8.93 1.08-1.27 2.28-2.43 3.59-3.47h7.76c-1.72 1.55-3.3 3.25-4.72 5.09a18.969 18.969 0 0 0-2.96 5.76c1.55.2 2.96.99 3.93 2.21a6.378 6.378 0 0 1 1.25 3.88v2.09c.05 1.61-.57 3.16-1.71 4.3-1.14 1.14-2.97 1.71-5.47 1.71" style="fill:#0e142b;stroke-width:0"/></g></svg> </div> <div class="TestimonialsSliderV2__SlideTop TestimonialsSliderV2__SlideTop--Long"> <blockquote>eSentire is an extension of our security and IT team. From the Customer Success Managers, Advanced Services Specialists all the way up to the Executive Management Team, we've seen endless value, tremendous customer support, quality and expertise. eSentire does a wonderful job of making sure we are wholly satisfied with the value we are seeing from their offerings." </blockquote> <h5>Caili Preston</h5> <h6>Information Security | Texas United Management</h6> <p><span>Manufacturing Industry</span></p> </div> <div class="TestimonialsSliderV2__SlideBottom"> <img src="https://esentire-dot-com-assets.s3.amazonaws.com/assetsV4/Common/Testimonials/tum-greyscale-quote-logo.png" alt="A logo of eSentire’s customer, Texas United Management, next to the quote from TUM’s Chief Information Officer who describes why eSentire stands out among MDR service providers." /> </div> </div> </div> </div> <button class="TestimonialsSliderV2__SlideBtn TestimonialsSliderV2__SlideBtn-next"><svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 38.22 38.22"><defs><style>.clsIconNextTestiV2-1{fill:none;stroke:#0e142b;stroke-linecap:round;stroke-linejoin:round;stroke-width:2px}</style></defs><g id="Layer_1-2"><g id="Component_1_3"><path id="Path_2972-2" d="M37.22 19.11c0 10-8.11 18.11-18.11 18.11S1 29.11 1 19.11 9.11 1 19.11 1c0 0 0 0 0 0 10 0 18.11 8.11 18.11 18.11Z" class="clsIconNextTestiV2-1"/><path id="Path_2973-2" d="m15.45 27.41 9.87-8.31h0l-9.87-8.3" class="clsIconNextTestiV2-1"/></g></g></svg></button> <button class="TestimonialsSliderV2__SlideBtn TestimonialsSliderV2__SlideBtn-prev"><svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 38.22 38.22"><defs><style>.clsIconPrevTesti-1{fill:none;stroke:#0e142b;stroke-linecap:round;stroke-linejoin:round;stroke-width:2px}</style></defs><g id="Layer_1-2"><g id="Component_1_1"><path id="Path_2972" d="M1 19.11C1 9.11 9.11 1 19.11 1s18.11 8.11 18.11 18.11-8.11 18.11-18.11 18.11c0 0 0 0 0 0C9.11 37.22 1 29.11 1 19.11Z" class="clsIconPrevTesti-1"/><path id="Path_2973" d="m22.77 10.81-9.87 8.31h0l9.87 8.3" class="clsIconPrevTesti-1"/></g></g></svg></button> </div> <a class="TestimonialsSlider__Cta" href="/resources/mdr-and-cybersecurity-case-studies">Read more case studies and reviews →</a> </div> </section> <!-- Initialize Swiper --> <script> var swiper = new Swiper(".TestimonialsSliderV2__Slides", { slidesPerView: 1, spaceBetween: 10, loop: true, centeredSlides: true, navigation: { nextEl: ".TestimonialsSliderV2__SlideBtn-next", prevEl: ".TestimonialsSliderV2__SlideBtn-prev", }, autoplay: { delay: 5000, }, breakpoints: { // when window width is >= 767px 767: { loop: false, spaceBetween: 30, }, } }); </script> <section class="GetStartedSmall"> <div class="GetStartedSmall__Content"> <h2>Ready to Get Started with eSentire DFIR Services? </h2> <p>We’re here to help! Submit your information and an eSentire representative will be in touch to discuss how eSentire Digital Forensics and Incident Response Services can ensure you quickly bring control & stability to the situation, if a breach should occur. </p> <div class="GetStartedSmall__Ctas"> <a href="/get-started">GET STARTED</a> <a href="/build-a-quote">BUILD A QUOTE</a> </div> </div> </section> <div id="cookie-consent" class="CookieConsent"> <div class="CookieConsent__Content"> <div class="CookieConsent__Row"> <div class="CookieConsent__Left"> <p>Cookies allow us to deliver the best possible experience for you on our website - by continuing to use our website or by closing this box, you are consenting to our use of cookies. Visit our <a href="/legal/privacy-policy" target="_blank">Privacy Policy</a> to learn more.</p> </div> <div class="CookieConsent__Right"> <a onclick="acceptCookieConsent();">Accept</a> </div> </div> </div> </div> <!-- Block: Footer --> <div class="Footer"> <div class="Footer__Contact"> <div class="Footer__ContactMessage">ARE YOU EXPERIENCING A SECURITY INCIDENT OR HAVE YOU BEEN BREACHED?</div> <a class="Footer__ContactNumber" href="tel:1-866-579-2200">Call 1-866-579-2200</a> </div> <div class="Footer__Content"> <div class="Footer__Top"> <div class="Footer__TopContent"> <div class="Footer__TopLeft"> <div class="Footer__TopLeftLogo"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 27.12 27.12"><circle cx="13.56" cy="13.56" r="13.56" style="fill:#263c91"/><path d="M17.82 8.59c-1.2-1.54-3.24-1.53-3.24-1.53h-2.04S10.5 7.05 9.3 8.59c-.73.94-.89 1.84-.89 2.47v5.01c0 .63.16 1.53.89 2.47 1.2 1.54 3.24 1.53 3.24 1.53h6.17v-2.89h-5.55s-.81 0-1.29-.61c-.29-.37-.36-.73-.36-.98V15h7.2v-3.93c0-.63-.16-1.53-.89-2.47Zm-6.31 2.78c0-.25.06-.61.36-.98.48-.61 1.29-.61 1.29-.61h.82s.81 0 1.29.61c.29.37.36.73.36.98v.76h-4.11v-.76Z" style="fill:#fff"/></svg> </div> <div class="Footer__TopLeftCopy"> <h3>The Proven Choice for <br>Managed Detection and Response</h3> <div class="Footer__TopLeftCopyCTAs"> <a href="/get-started">GET STARTED <span>→</span></a> <a href="https://esentire.channeltivity.com/Login" target="_blank">PARTNER LOGIN <span>→</span></a> </div> </div> </div> <div class="Footer__TopRight"> <div class="Footer__TopRightCopy"> <h3>Sales and <br>Customer Support</h3> </div> <div class="Footer__TopRightLinks"> <a href="tel:1-866-579-2200" class="Footer__TopRightLink"> <span>NORTH AMERICA</span> <span>1-866-579-2200</span> </a> <a href="tel:+44(0)8000 443242" class="Footer__TopRightLink"> <span>EMEA</span> <span>(0)8000-443242</span> </a> <a href="tel:+1 519 651 2200" class="Footer__TopRightLink"> <span>ANZ/APAC</span> <span>1-519-651-2200</span> </a> </div> </div> </div> </div> <div class="Footer__Middle"> <div class="Footer__MiddleContent"> <div class="Footer__MiddleSocialForm"> <div class="Footer__MiddleSocial"> <a href="https://ca.linkedin.com/company/esentire-inc-" target="_blank"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 34.62 35.53"><defs><style>.clsLinkedFooterIcon-1{fill:#172143;stroke-width:0}</style></defs><g id="Component_61_4"><path id="Rectangle_602" d="M2.96 12.68h6.21v19.79H2.96z" class="clsLinkedFooterIcon-1"/><path id="Path_1036" d="M25.95 12.24c-.23-.03-.47-.04-.72-.05-2.38-.13-4.66.92-6.12 2.8-.1.12-.19.25-.27.39v-2.65H12.9v19.79h6.21v-9.3c-.15-1.36.04-2.74.57-4 .56-.99 1.62-1.59 2.76-1.55a3.29 3.29 0 0 1 3.5 3.06V32.61h6.21V19.7c0-4.42-2.24-7.03-6.21-7.46" class="clsLinkedFooterIcon-1"/><path id="Path_1037" d="M9.67 6.52c0 1.99-1.61 3.6-3.6 3.6s-3.6-1.61-3.6-3.6 1.61-3.6 3.6-3.6 3.6 1.61 3.6 3.6" class="clsLinkedFooterIcon-1"/></g></svg> </a> <a href="https://twitter.com/eSentire" target="_blank"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34.32 35.52"><path d="M25.65 5.92h4.53l-9.89 11.3L31.92 32.6h-9.11l-7.13-9.33-8.16 9.33H2.98l10.58-12.09L2.4 5.91h9.34l6.45 8.53 7.46-8.52ZM24.06 29.9h2.51L10.38 8.49H7.69L24.06 29.9Z" style="fill:#172143;stroke-width:0"/></svg> </a> <a href="https://www.youtube.com/c/eSentireInc" target="_blank"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 43.64 35.51"><path d="M35.02 8.42H8.63c-3.53 0-6.38 2.86-6.38 6.38v11.42c0 3.53 2.86 6.38 6.38 6.38h26.39c3.53 0 6.38-2.86 6.38-6.38V14.8c0-3.53-2.86-6.38-6.38-6.38ZM17.88 26.37V14.63l10.17 5.87-10.17 5.87Z" style="fill:#172143;stroke-width:0"/></svg> </a> </div> <div class="Footer__MiddleForm"> <iframe id="Footer__IframeEmbed" scrolling="no" src="https://mdr.esentire.com/l/651833/2023-08-01/2pz6mw"></iframe> </div> </div> <div class="Footer__MiddleGrid"> <div class="Footer__LinksGroup"> <div class="Footer__LinksGroupHeader"> <h5>What we do</h5> <svg viewBox="0 0 15 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M14.24 0.75L7.49 7.49L0.75 0.75" stroke="currentColor" stroke-width="1.5" stroke-miterlimit="10" stroke-linecap="round" stroke-linejoin="round"/> </svg> </div> <nav> <a href="/what-we-do/esentire-managed-detection-and-response">Managed Detection and Response</a> <a href="/what-we-do/digital-forensics-and-incident-response">Digital Forensics and Incident Response</a> <a href="/what-we-do/exposure-vulnerability-and-risk-management">Exposure Management Services</a> <a href="/what-we-do/xdr-extended-detection-and-response">Extended Detection and Response (XDR)</a> <a href="/what-we-do/security-operations-center">Security Operations Center (SOC)</a> <a href="/what-we-do/mdr-integrations">Technology Integrations</a> <a href="/what-we-do/threat-response-unit">Threat Response Unit (TRU)</a> <a href="/what-we-do/team-esentire">Cyber Resilience Team</a> <a href="/what-we-do/esentire-managed-detection-and-response/microsoft-mdr">MDR for Microsoft</a> <a href="/what-we-do/esentire-managed-detection-and-response/aws-cloud-security">MDR for AWS</a> <a href="/what-we-do/esentire-managed-detection-and-response/mdr-for-genai">MDR for GenAI</a> <a href="/what-we-do/esentire-managed-detection-and-response/response-and-remediation">Response and Remediation</a> <a href="/how-we-do-it/mdr-pricing-packaging">MDR Pricing</a> </nav> </div> <div class="Footer__LinksGroup"> <div class="Footer__LinksGroupHeader"> <h5>How we do it</h5> <svg viewBox="0 0 15 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M14.24 0.75L7.49 7.49L0.75 0.75" stroke="currentColor" stroke-width="1.5" stroke-miterlimit="10" stroke-linecap="round" stroke-linejoin="round"/> </svg> </div> <nav> <a href="/how-we-do-it/signals/mdr-for-endpoint">Endpoint</a> <a href="/how-we-do-it/signals/mdr-for-network">Network</a> <a href="/how-we-do-it/signals/mdr-for-log">Log</a> <a href="/how-we-do-it/signals/cloud">Cloud</a> <a href="/how-we-do-it/signals/identity">Identity</a> </nav> </div> <div class="Footer__LinksGroup"> <div class="Footer__LinksGroupHeader"> <h5>Industries</h5> <svg viewBox="0 0 15 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M14.24 0.75L7.49 7.49L0.75 0.75" stroke="currentColor" stroke-width="1.5" stroke-miterlimit="10" stroke-linecap="round" stroke-linejoin="round"/> </svg> </div> <nav> <a href="/how-we-do-it/industries/insurance-cybersecurity">Insurance</a> <a href="/how-we-do-it/industries/construction-cybersecurity">Construction</a> <a href="/how-we-do-it/industries/financial-services-cybersecurity">Finance</a> <a href="/how-we-do-it/industries/legal-cybersecurity">Legal</a> <a href="/how-we-do-it/industries/manufacturing-cybersecurity">Manufacturing</a> <a href="/how-we-do-it/industries/private-equity-cybersecurity">Private Equity</a> <a href="/how-we-do-it/industries/healthcare-cybersecurity">Healthcare</a> <a href="/how-we-do-it/industries/retail-cybersecurity">Retail</a> <a href="/how-we-do-it/industries/food-supply-cybersecurity">Food Supply</a> <a href="/how-we-do-it/industries/state-local-governments-cybersecurity">Government and Education</a> <a href="/how-we-do-it/industries/automotive-dealerships">Automotive Dealerships</a> </nav> </div> <div class="Footer__LinksGroup"> <div class="Footer__LinksGroupHeader"> <h5>Use Cases</h5> <svg viewBox="0 0 15 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M14.24 0.75L7.49 7.49L0.75 0.75" stroke="currentColor" stroke-width="1.5" stroke-miterlimit="10" stroke-linecap="round" stroke-linejoin="round"/> </svg> </div> <nav> <a href="/how-we-do-it/use-cases/ransomware">Ransomware</a> <a href="/how-we-do-it/use-cases/third-party-cyber-risk">Third-Party Risk</a> <a href="/how-we-do-it/use-cases/sensitive-data">Sensitive Data Security</a> <a href="/how-we-do-it/use-cases/cloud-misconfiguration-breaches">Cloud Misconfiguration</a> <a href="/how-we-do-it/use-cases/zero-day-exploits">Zero Day Attacks</a> <a href="/how-we-do-it/use-cases/cyber-risk-management">Cyber Risk</a> <a href="/how-we-do-it/use-cases/cybersecurity-compliance">Cybersecurity Compliance</a> <a href="/how-we-do-it/use-cases/mdr-outsourcing">Do More With Less</a> <a href="/how-we-do-it/use-cases/meet-cyber-insurance-requirements">Cyber Insurance</a> <a href="/how-we-do-it/use-cases/security-leadership">Security Leadership</a> <a href="/how-we-do-it/use-cases/cyber-threat-intelligence">Cyber Threat Intelligence</a> </nav> </div> <div class="Footer__LinksGroup"> <div class="Footer__LinksGroupHeader"> <h5>Resources</h5> <svg viewBox="0 0 15 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M14.24 0.75L7.49 7.49L0.75 0.75" stroke="currentColor" stroke-width="1.5" stroke-miterlimit="10" stroke-linecap="round" stroke-linejoin="round"/> </svg> </div> <nav> <a href="/resources/security-advisories">Security Advisories</a> <a href="/resources/blog">Blog</a> <a href="/resources/library">Resource Library</a> <a href="/resources/video-library">Video Library</a> <a href="/resources/tru-intelligence-center">TRU Intelligence Center</a> <a href="/resources/mdr-and-cybersecurity-case-studies">Case Studies</a> <a href="/switch-to-esentire">Switch to eSentire</a> <a href="/consolidate-and-save">Consolidate & Save</a> <a href="/esentire-mdr-vs-everyone">Real vs. Fake MDR</a> <a href="/esentire-mdr-vs-everyone/compare">Compare MDR Vendors</a> <a href="/cybersecurity-fundamentals-defined">Cybersecurity Glossary</a> </nav> </div> <div class="Footer__LinksGroup"> <div class="Footer__LinksGroupHeader"> <h5>Tools</h5> <svg viewBox="0 0 15 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M14.24 0.75L7.49 7.49L0.75 0.75" stroke="currentColor" stroke-width="1.5" stroke-miterlimit="10" stroke-linecap="round" stroke-linejoin="round"/> </svg> </div> <nav> <a href="/cybersecurity-assessment-tool">Cybersecurity Assessment</a> <a href="/mdr-roi-calculator">MDR ROI Calculator</a> <a href="/security-operations-center-pricing-calculator">SOC Calculator</a> <a href="/mitre-attck-framework-tool">MITRE ATT&CK® Tool</a> </nav> </div> <div class="Footer__LinksGroup"> <div class="Footer__LinksGroupHeader"> <h5>Company</h5> <svg viewBox="0 0 15 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M14.24 0.75L7.49 7.49L0.75 0.75" stroke="currentColor" stroke-width="1.5" stroke-miterlimit="10" stroke-linecap="round" stroke-linejoin="round"/> </svg> </div> <nav> <a href="/company/about-us">About Us</a> <a href="/company/leadership">Leadership</a> <a href="/company/newsroom">Newsroom</a> <a href="/company/event-calendar">Event Calendar</a> <a href="/company/careers">Careers</a> <a href="/partners">Partners</a> <a href="/en-au-nz/switch-to-esentire">Australia & New Zealand</a> <a href="/en-gb/switch-to-esentire">United Kingdom</a> </nav> </div> </div> </div> </div> <div class="Footer__Legal"> <p>2024 eSentire, Inc. All Rights Reserved.</p> <nav class="Footer__LegalNav"> <a href="/sitemap">Sitemap</a> <a href="/legal/terms-and-conditions">Terms and Conditions</a> <a href="/legal/privacy-policy">Privacy Policy</a> <a href="/legal/accessibility">Accessibility</a> <a href="/legal/documents">Legal</a> </nav> </div> </div> </div> <script> // Create cookie function setCookie(cname, cvalue, exdays) { const d = new Date(); d.setTime(d.getTime() + (exdays*24*60*60*1000)); let expires = "expires="+ d.toUTCString(); document.cookie = cname + "=" + cvalue + ";" + expires + ";path=/"; } // Delete cookie function deleteCookie(cname) { const d = new Date(); d.setTime(d.getTime() + (24*60*60*1000)); let expires = "expires="+ d.toUTCString(); document.cookie = cname + "=;" + expires + ";path=/"; } // Read cookie function getCookie(cname) { let name = cname + "="; let decodedCookie = decodeURIComponent(document.cookie); let ca = decodedCookie.split(';'); for(let i = 0; i <ca.length; i++) { let c = ca[i]; while (c.charAt(0) == ' ') { c = c.substring(1); } if (c.indexOf(name) == 0) { return c.substring(name.length, c.length); } } return ""; } // Set cookie consent function acceptCookieConsent(){ deleteCookie('user_cookie_consent'); setCookie('user_cookie_consent', 1, 30); document.getElementById("cookie-consent").classList.remove('show'); } let cookie_consent = getCookie("user_cookie_consent"); if(cookie_consent != ""){ }else{ document.getElementById("cookie-consent").classList.add('show'); } </script> <script type="application/ld+json">{"@context":"http://schema.org","@graph":[{"@type":"WebPage","author":{"@id":"https://www.esentire.com/#identity"},"copyrightHolder":{"@id":"https://www.esentire.com/#identity"},"copyrightYear":"2021","creator":{"@id":"https://www.esentire.com/#creator"},"dateCreated":"2021-05-21T17:04:06-04:00","dateModified":"2024-10-23T15:50:30-04:00","datePublished":"2021-05-21T17:03:00-04:00","description":"Get back to normal operations in a matter of hours with our guaranteed 4-hour threat suppression available with eSentire Digital Forensics and Incident Response.","headline":"Digital Forensics - Incident Response - Incident Detection - Cyber Incident Response","image":{"@type":"ImageObject","url":"https://s3.ca-central-1.amazonaws.com/esentire-dot-com-assets/assetsV3/External/SEO/esentire-dfir-meta.jpg"},"inLanguage":"en-us","mainEntityOfPage":"https://www.esentire.com/what-we-do/digital-forensics-and-incident-response","name":"Digital Forensics - Incident Response - Incident Detection - Cyber Incident Response","publisher":{"@id":"https://www.esentire.com/#creator"},"url":"https://www.esentire.com/what-we-do/digital-forensics-and-incident-response"},{"@id":"https://www.esentire.com/#identity","@type":"LocalBusiness","address":{"@type":"PostalAddress","addressCountry":"CA","addressLocality":"Waterloo","addressRegion":"Ontario","postalCode":"N2L 3X2","streetAddress":"451 Phillip St, Suite 135, ON"},"alternateName":"eSentire Corporate Marketing","description":"eSentire, Inc., the Authority in Managed Detection and Response (MDR), protects the critical data and applications of 2000+ organizations in 80+ countries, across 35 industries from known and unknown cyber threats by providing Exposure Management, Managed Detection and Response and Incident Response services designed to build an organization’s cyber resilience & prevent business disruption. Founded in 2001, eSentire protects the world’s most targeted organizations with 65% of its global base recognized as critical infrastructure, vital to economic health and stability. By combining open XDR platform technology, 24/7 threat hunting, and proven security operations leadership, eSentire’s award-winning MDR services and team of experts help organizations anticipate, withstand and recover from cyberattacks. For more information, visit www.esentire.com and follow @webinars.","email":"info@esentire.com","founder":"Eldon Sprickerhoff","foundingDate":"2001-01-01","foundingLocation":"Waterloo, Ontario","geo":{"@type":"GeoCoordinates","latitude":"43.48356169301266","longitude":"-80.54315326704616"},"image":{"@type":"ImageObject","height":"512","url":"https://s3.ca-central-1.amazonaws.com/esentire-dot-com-assets/assets/eSentire_emblem_512x512.jpg","width":"512"},"logo":{"@type":"ImageObject","height":"60","url":"https://esentire-dot-com-assets.s3.amazonaws.com/assets/_600x60_fit_center-center_82_none/302747/eSentire_emblem_512x512.png?mtime=1709753172","width":"60"},"name":"eSentire Inc.","openingHoursSpecification":[{"@type":"OpeningHoursSpecification","closes":"09:00:00","dayOfWeek":["Sunday"],"opens":"09:00:00"},{"@type":"OpeningHoursSpecification","closes":"09:00:00","dayOfWeek":["Monday"],"opens":"09:00:00"},{"@type":"OpeningHoursSpecification","closes":"09:00:00","dayOfWeek":["Tuesday"],"opens":"09:00:00"},{"@type":"OpeningHoursSpecification","closes":"09:00:00","dayOfWeek":["Wednesday"],"opens":"09:00:00"},{"@type":"OpeningHoursSpecification","closes":"09:00:00","dayOfWeek":["Thursday"],"opens":"09:00:00"},{"@type":"OpeningHoursSpecification","closes":"09:00:00","dayOfWeek":["Friday"],"opens":"09:00:00"},{"@type":"OpeningHoursSpecification","closes":"09:00:00","dayOfWeek":["Saturday"],"opens":"09:00:00"}],"priceRange":"$$$","telephone":"1-866-579-2200","url":"https://www.esentire.com"},{"@id":"https://www.esentire.com/#creator","@type":"ProfessionalService","address":{"@type":"PostalAddress","addressCountry":"CA","addressLocality":"Waterloo","addressRegion":"Ontario","postalCode":"N2L 3X2","streetAddress":"451 Phillip St, Suite 135, ON"},"alternateName":"eSentire Corporate Marketing","email":"info@esentire.com","founder":"Eldon Sprickerhoff","foundingDate":"2001-01-01","foundingLocation":"Waterloo, Ontario","geo":{"@type":"GeoCoordinates","latitude":"43.48356169301266","longitude":"-80.54315326704616"},"image":{"@type":"ImageObject","height":"512","url":"https://s3.ca-central-1.amazonaws.com/esentire-dot-com-assets/assets/eSentire_emblem_512x512.jpg","width":"512"},"logo":{"@type":"ImageObject","height":"60","url":"https://esentire-dot-com-assets.s3.amazonaws.com/assets/_600x60_fit_center-center_82_none/302747/eSentire_emblem_512x512.png?mtime=1709753172","width":"60"},"name":"eSentire Inc.","priceRange":"$$$","telephone":"1-866-579-2200","url":"https://www.esentire.com"},{"@type":"BreadcrumbList","description":"Breadcrumbs list","itemListElement":[{"@type":"ListItem","item":"https://www.esentire.com","name":"Homepage","position":1},{"@type":"ListItem","item":"https://www.esentire.com/what-we-do","name":"What We Do","position":2},{"@type":"ListItem","item":"https://www.esentire.com/what-we-do/digital-forensics-and-incident-response","name":"Digital Forensics and Incident Response","position":3}],"name":"Breadcrumbs"}]}</script> <script src="/main.js?v=4.11.57"></script> <script src="/style.js"></script> <script type="text/javascript" src="https://unpkg.com/aos@2.3.1/dist/aos.js"></script> <script type="text/javascript"> function readCookie(c_name) { var c_value = document.cookie; var c_start = c_value.indexOf(" " + c_name + "="); if (c_start == -1) { c_start = c_value.indexOf(c_name + "="); } if (c_start == -1) { c_value = null; } else { c_start = c_value.indexOf("=", c_start) + 1; var c_end = c_value.indexOf(";", c_start); if (c_end == -1) { c_end = c_value.length; } c_value = unescape(c_value.substring(c_start, c_end)); } return c_value; } </script> <script> AOS.init(); </script> <noscript> <img src="https://ws.zoominfo.com/pixel/3k8XsFBkOniCq5dTRwpV" alt="ZoomInfo Image for Video" width="1" height="1" style="display: none;" /> </noscript> <script type="text/javascript"> window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.defer = true; mf.src = "//cdn.mouseflow.com/projects/ce788296-8259-4e39-bcae-56ddd5b7e767.js"; document.getElementsByTagName("head")[0].appendChild(mf); })(); </script> </body> </html><!-- Cached by Blitz on 2024-11-21T23:04:33-05:00 --><!-- Served by Blitz on 2024-11-26T21:49:55-05:00 -->